Sciweavers

309 search results - page 41 / 62
» A Type System for Expressive Security Policies
Sort
View
WWW
2010
ACM
14 years 2 months ago
Object views: fine-grained sharing in browsers
Browsers do not currently support the secure sharing of JavaScript objects between principals. We present this problem as the need for object views, which are consistent and contr...
Leo A. Meyerovich, Adrienne Porter Felt, Mark S. M...
SACMAT
2006
ACM
14 years 1 months ago
Fine-grained role-based delegation in presence of the hybrid role hierarchy
Delegation of authority is an important process that needs to be captured by any access control model. In role-based access control models, delegation of authority involves delega...
James B. D. Joshi, Elisa Bertino
CN
1999
93views more  CN 1999»
13 years 7 months ago
Bro: a system for detecting network intruders in real-time
We describe Bro, a stand-alone system for detecting network intruders in real-time by passively monitoring a network link over which the intruder's traffic transits. We give ...
Vern Paxson
ICDE
2007
IEEE
164views Database» more  ICDE 2007»
14 years 2 months ago
Multi-session Separation of Duties (MSoD) for RBAC
Separation of duties (SoD) is a key security requirement for many business and information systems. Role Based Access Controls (RBAC) is a relatively new paradigm for protecting i...
David W. Chadwick, Wensheng Xu, Sassa Otenko, Roma...
DBSEC
2001
154views Database» more  DBSEC 2001»
13 years 9 months ago
Regulating Access to XML documents
In this paper, our objective is to define a security model for regulating access to XML documents. Our model offers a security policy with a great expressive power. An XML documen...
Alban Gabillon, Emmanuel Bruno