Sciweavers

609 search results - page 96 / 122
» A Privacy Manager for Cloud Computing
Sort
View
SACMAT
2009
ACM
14 years 2 months ago
Safety in discretionary access control for logic-based publish-subscribe systems
Publish-subscribe (pub-sub) systems are useful for many applications, including pervasive environments. In the latter context, however, great care must be taken to preserve the pr...
Kazuhiro Minami, Nikita Borisov, Carl A. Gunter
CCS
2007
ACM
14 years 2 months ago
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
WISA
2007
Springer
14 years 1 months ago
A Compositional Multiple Policies Operating System Security Model
Multilevel security policies aim at only confidentiality assurance, with less consideration on integrity assurance and weakness in expressing channel control policies. Besides, the...
Lei Xia, Wei Huang, Hao Huang
CCS
2003
ACM
14 years 1 months ago
Print signatures for document authentication
We present a novel solution for authenticating printed paper documents by utilizing the inherent non–repeatable randomness existing in the printing process. For a document print...
Baoshi Zhu, Jiankang Wu, Mohan S. Kankanhalli
CCS
2008
ACM
13 years 9 months ago
Avoiding timing channels in fixed-priority schedulers
A practically feasible modification to fixed-priority schedulers allows to avoid timing channels despite threads having access to precise clocks. This modification is rather simpl...
Marcus Völp, Claude-Joachim Hamann, Hermann H...