Sciweavers

209 search results - page 23 / 42
» Exploiting Information Relationships for Access Control
Sort
View
SOSP
2003
ACM
14 years 7 months ago
Decentralized user authentication in a global file system
The challenge for user authentication in a global file system is allowing people to grant access to specific users and groups in remote administrative domains, without assuming ...
Michael Kaminsky, George Savvides, David Mazi&egra...
ISW
2010
Springer
13 years 8 months ago
Privilege Escalation Attacks on Android
Abstract. Android is a modern and popular software platform for smartphones. Among its predominant features is an advanced security model which is based on application-oriented man...
Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeg...
ICDCS
2006
IEEE
14 years 4 months ago
A Locality-Aware Cooperative Cache Management Protocol to Improve Network File System Performance
In a distributed environment the utilization of file buffer caches in different clients may vary greatly. Cooperative caching is used to increase cache utilization by coordinatin...
Song Jiang, Fabrizio Petrini, Xiaoning Ding, Xiaod...
PODS
1999
ACM
95views Database» more  PODS 1999»
14 years 3 months ago
Minimal Data Upgrading to Prevent Inference and Association
Despite advances in recent years in the area of mandatory access control in database systems, today's information repositories remain vulnerable to inference and data associa...
Steven Dawson, Sabrina De Capitani di Vimercati, P...
VISSOFT
2005
IEEE
14 years 4 months ago
Multi-level Method Understanding Using Microprints
Understanding classes and methods is a key activity in object-oriented programming, since classes represent the abstractions from which applications are built, while methods conta...
Stéphane Ducasse, Michele Lanza, Romain Rob...