Sciweavers

468 search results - page 65 / 94
» A compositional framework for access control policies enforc...
Sort
View
IEEECIT
2010
IEEE
13 years 5 months ago
Virtual Security Kernel: A Component-Based OS Architecture for Self-Protection
—This paper presents VSK, a lightweight adaptable OS authorization architecture suitable for self-protection of pervasive devices. A “virtual” management plane, separate from...
Ruan He, Marc Lacoste, Jean Leneutre
WECWIS
2009
IEEE
198views ECommerce» more  WECWIS 2009»
14 years 2 months ago
Bridging the Gap between User Attributes and Service Policies with Attribute Mapping
—People, companies, and public authorities can now have a strong on-line presence and a huge amount of interactions on the Internet, made possible by the impressive growth of the...
Davide Cerri, Francesco Corcoglioniti
FOSSACS
2005
Springer
14 years 28 days ago
Bridging Language-Based and Process Calculi Security
Language-based and process calculi-based information security are well developed fields of computer security. Although these fields have much in common, it is somewhat surprising...
Riccardo Focardi, Sabina Rossi, Andrei Sabelfeld
IEEEIAS
2008
IEEE
14 years 1 months ago
Developing a Security Typed Java Servlet
: The Lack of security policy enforcement in web development languages is one of the most important challenges in web application systems development, as there is no formal check f...
Doaa Hassan, Sherif El-Kassas, Ibrahim Ziedan
CCS
2010
ACM
13 years 6 months ago
A control point for reducing root abuse of file-system privileges
We address the problem of restricting root’s ability to change arbitrary files on disk, in order to prevent abuse on most current desktop operating systems. The approach first...
Glenn Wurster, Paul C. van Oorschot