Sciweavers

196 search results - page 3 / 40
» A Hacking View of Access Control
Sort
View
CORR
2010
Springer
132views Education» more  CORR 2010»
13 years 7 months ago
New Frontiers of Network Security: The Threat Within
Nearly 70% of information security threats originate from inside the organization. The instances of insider threats have been increasing at an alarming rate with the latest trends ...
Sugata Sanyal, Ajit Shelat, Amit Gupta
COMPSAC
2006
IEEE
14 years 3 months ago
A Pattern-Based Technique for Developing UML Models of Access Control Systems
This paper describes a pattern-based technique for systematic development of UML models of secure systems using access control. Access control is viewed and specified as a design...
Dae-Kyoo Kim, Priya Gokhale
ICDE
2006
IEEE
179views Database» more  ICDE 2006»
14 years 11 months ago
ACXESS - Access Control for XML with Enhanced Security Specifications
We present ACXESS (Access Control for XML with Enhanced Security Specifications), a system for specifying and enforcing enhanced security constraints on XML via virtual "secu...
Sriram Mohan, Jonathan Klinginsmith, Arijit Sengup...
SDMW
2007
Springer
14 years 3 months ago
Query Rewriting Algorithm Evaluation for XML Security Views
Abstract. We investigate the experimental effectiveness of query rewriting over XML security views. Our model consists of access control policies specified over DTDs with XPath e...
Nataliya Rassadko
JCM
2007
122views more  JCM 2007»
13 years 9 months ago
Petri Net Based Controller Concept For Cognitive Radios in Wireless Access Networks
—This paper will give a detailed discussion about the authors view on Software Defined and Cognitive Radio.
Alexander Vießmann, Admir Burnic, Christoph ...