Sciweavers

352 search results - page 31 / 71
» Context-sensitive Access Control Model and Implementation
Sort
View
CCS
2008
ACM
13 years 10 months ago
Enforcing a security pattern in stakeholder goal models
Patterns are useful knowledge about recurring problems and solutions. Detecting a security problem using patterns in requirements models may lead to its early solution. In order t...
Yijun Yu, Haruhiko Kaiya, Hironori Washizaki, Ying...
WETICE
2008
IEEE
14 years 3 months ago
On the Modeling of Bell-LaPadula Security Policies Using RBAC
The Bell-LaPadula security model is a hybrid model that combines mandatory access controls and discretionary access controls. The Bell-LaPadula security model has been widely acce...
Gansen Zhao, David W. Chadwick
ISW
2009
Springer
14 years 3 months ago
Privacy-Aware Attribute-Based Encryption with User Accountability
As a new public key primitive, attribute-based encryption (ABE) is envisioned to be a promising tool for implementing fine-grained access control. To further address the concern o...
Jin Li, Kui Ren, Bo Zhu, Zhiguo Wan
CCS
2010
ACM
13 years 7 months ago
Protecting location privacy against inference attacks
GPS-enabled mobile devices are a quickly growing market and users are starting to share their location information with each other through services such as Google Latitude. Locati...
Kazuhiro Minami, Nikita Borisov
HICSS
1995
IEEE
109views Biometrics» more  HICSS 1995»
14 years 9 days ago
The architecture of an optimistic CPU: the WarpEngine
The architecture for a shared memory CPU is described. The CPU allows for parallelism down to the level of single instructions and is tolerant of memory latency. All executable in...
John G. Cleary, Murray Pearson, Husam Kinawi