Sciweavers

370 search results - page 33 / 74
» Enforcing Access Control Using Risk Assessment
Sort
View
134
Voted
SP
2007
IEEE
183views Security Privacy» more  SP 2007»
15 years 8 months ago
Ciphertext-Policy Attribute-Based Encryption
In several distributed systems a user should only be able to access data if a user posses a certain set of credentials or attributes. Currently, the only method for enforcing such...
John Bethencourt, Amit Sahai, Brent Waters
96
Voted
ESORICS
2007
Springer
15 years 8 months ago
Maintaining High Performance Communication Under Least Privilege Using Dynamic Perimeter Control
Abstract. From a security standpoint, it is preferable to implement least privilege network security policies in which only the bare minimum of TCP/UDP ports on internal hosts are ...
Paul Z. Kolano
110
Voted
CCS
2008
ACM
15 years 4 months ago
Flexible security configuration for virtual machines
Virtual machines are widely accepted as a promising basis for building secure systems. However, while virtual machines offer effective mechanisms to create isolated environments, ...
Sandra Rueda, Yogesh Sreenivasan, Trent Jaeger
116
Voted
CAD
2007
Springer
15 years 2 months ago
A new digital human environment and assessment of vehicle interior design
Vehicle interior design directly relates to driver performance measures such as comfort, efficiency, risk of injury, and vehicle safety. A digital human is a convenient tool for ...
Jingzhou Yang, Joo H. Kim, Karim Abdel-Malek, Timo...
122
Voted
CCS
2007
ACM
15 years 8 months ago
Automaton segmentation: a new approach to preserve privacy in xml information brokering
A Distributed Information Brokering System (DIBS) is a peer-to-peer overlay network that comprises diverse data servers and brokering components helping client queries locate the ...
Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hs...