Sciweavers

407 search results - page 59 / 82
» An Ontology-based Approach to the Formalization of Informati...
Sort
View
ESORICS
2007
Springer
14 years 1 months ago
Conditional Privacy-Aware Role Based Access Control
Privacy is considered critical for all organizations needing to manage individual related information. As such, there is an increasing need for access control models which can adeq...
Qun Ni, Dan Lin, Elisa Bertino, Jorge Lobo
CCS
2001
ACM
13 years 12 months ago
Flexible authentication of XML documents
XML is increasingly becoming the format of choice for information exchange on the Internet. As this trend grows, one can expect that documents (or collections thereof) may get qui...
Premkumar T. Devanbu, Michael Gertz, April Kwong, ...
IEEESP
2007
98views more  IEEESP 2007»
13 years 7 months ago
Educating Students to Create Trustworthy Systems
igh level of abstraction and to provide broad oversight. In contrast, the goal of computer science security education is to provide the technicalexpertisetodevelopsecure software a...
Richard S. Swart, Robert F. Erbacher
ESORICS
2009
Springer
13 years 11 months ago
Declassification with Explicit Reference Points
Noninterference requires that public outputs of a program must be completely independent from secrets. While this ensures that secrets cannot be leaked, it is too restrictive for m...
Alexander Lux, Heiko Mantel
GPCE
2007
Springer
14 years 1 months ago
Aspects of availability
In this paper, we propose a domain-specific aspect language to prevent the denials of service caused by resource management. Our aspects specify availability policies by enforcin...
Pascal Fradet, Stéphane Hong Tuan Ha