Sciweavers

1134 search results - page 34 / 227
» Distributed Proving in Access-Control Systems
Sort
View
ACSC
2002
IEEE
15 years 7 months ago
Bracket Capabilities for Distributed Systems Security
The per-method access control lists of standard middleware technologies allow only simple forms of access control to be expressed and enforced. Research systems based on capabilit...
Mark Evered
106
Voted
CHI
2008
ACM
16 years 2 months ago
A user study of policy creation in a flexible access-control system
Significant effort has been invested in developing expressive and flexible access-control languages and systems. However, little has been done to evaluate these systems in practic...
Lujo Bauer, Lorrie Faith Cranor, Robert W. Reeder,...
COLCOM
2007
IEEE
15 years 9 months ago
Secure peer-to-peer networks for trusted collaboration
Abstract—An overview of recent advances in secure peerto-peer networking is presented, toward enforcing data integrity, confidentiality, availability, and access control policie...
Kevin W. Hamlen, Bhavani M. Thuraisingham
119
Voted
POLICY
2007
Springer
15 years 8 months ago
XACML Function Annotations
XACML is being increasingly adopted in large enterprise systems for specifying access control policies. However, the efficient analysis and integration of multiple policies in suc...
Prathima Rao, Dan Lin, Elisa Bertino
149
Voted
CCS
2008
ACM
15 years 4 months ago
Assessing query privileges via safe and efficient permission composition
We propose an approach for the selective enforcement of access control restrictions in, possibly distributed, large data collections based on two basic concepts: i) flexible autho...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...