Sciweavers

635 search results - page 40 / 127
» A Context-Sensitive Access Control Model and Prototype Imple...
Sort
View
FTCS
1998
79views more  FTCS 1998»
13 years 9 months ago
Proving Correctness of a Controller Algorithm for the RAID Level 5 System
Most RAID controllers implemented in industry are complicated and di cult to reason about. This complexity has led to software and hardware systems that are di cult to debug and h...
Mandana Vaziri, Nancy A. Lynch, Jeannette M. Wing
ACSAC
2000
IEEE
14 years 1 days ago
Secure Compartmented Data Access over an Untrusted Network using a COTS-based Architecture
In this paper, we present an approach to secure compartmented data access over an untrusted network using a secure network computing architecture. We describe the architecture and...
P. C. Clark, M. C. Meissner, K. O. Vance
COLLABORATION
1999
Springer
13 years 12 months ago
Shifting the Focus from Control to Communication: the STReams OBjects Environments Model of Communicating Agents
The paper presents the computational model underlying new agent communication languages. The model, called STROBE, has been identified and two prototypical languages inspired by th...
Stefano A. Cerri
ACSC
2002
IEEE
14 years 18 days ago
Bracket Capabilities for Distributed Systems Security
The per-method access control lists of standard middleware technologies allow only simple forms of access control to be expressed and enforced. Research systems based on capabilit...
Mark Evered
SP
1997
IEEE
126views Security Privacy» more  SP 1997»
13 years 11 months ago
Filtering Postures: Local Enforcement for Global Policies
When packet filtering is used as a security mechanism, different routers may need to cooperate to enforce the desired security policy. It is difficult to ensure that they will d...
Joshua D. Guttman