Sciweavers

177 search results - page 7 / 36
» Access Control Based on Execution History
Sort
View
CSREASAM
2009
13 years 8 months ago
Incremental Information Flow Analysis of Role Based Access Control
Role-Based Access Control (RBAC) has been widely used for expressing access control policies. Although RBAC provides flexible mechanisms to control the access to information, it do...
Mikhail I. Gofman, Ruiqi Luo, Jian He, Yingbin Zha...
SOCO
2008
Springer
13 years 7 months ago
Component-Based Access Control: Secure Software Composition through Static Analysis
Abstract. Extensible Component Platforms support the discovery, installation, starting, uninstallation of components at runtime. Since they are often targeted at mobile resource-co...
Pierre Parrend, Stéphane Frénot
ICDCSW
2003
IEEE
14 years 23 days ago
Privilege Delegation and Agent-Oriented Access Control in Naplet
Access control in existing Java-based mobile agents is mostly based on code source due to limitations of early Java security architecture. That is, authorization is based on where...
Cheng-Zhong Xu, Song Fu
PKC
2009
Springer
210views Cryptology» more  PKC 2009»
14 years 8 months ago
Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials
In this work, we consider the task of allowing a content provider to enforce complex access control policies on oblivious protocols conducted with anonymous users. As our primary ...
Scott E. Coull, Matthew Green, Susan Hohenberger
GCC
2004
Springer
14 years 26 days ago
A New Grid Security Framework with Dynamic Access Control
Abstract. In this paper, a new Grid security framework based on dynamic access control is introduced to address some security problem in Grid. Based on the dynamic evaluating resul...
Bing Xie, Xiaolin Gui, Yinan Li, Depei Qian