Sciweavers

660 search results - page 41 / 132
» History-Based Access Control and Secure Information Flow
Sort
View
ESORICS
2007
Springer
14 years 2 months ago
What, Indeed, Is Intransitive Noninterference?
Abstract. This paper argues that Haigh and Young’s definition of noninterference for intransitive security policies admits information flows that are not in accordance with the...
Ron van der Meyden
IJNSEC
2007
131views more  IJNSEC 2007»
13 years 8 months ago
An Asymmetric Cryptographic Key Assignment Scheme for Access Control in Tree Structural Hierarchies
In a hierarchical structure, a user in a security class has access to information items of another class if and only if the former class is a predecessor of latter. Based upon cry...
Debasis Giri, Parmeshwary Dayal Srivastava
JDCTA
2008
74views more  JDCTA 2008»
13 years 8 months ago
Processing Logical Access Control Command in Computer System
Access control includes physical and logical access control. Physical access control protects the damage, theft and losing of assess. In this paper, we propose the method to prote...
Tsang-Yean Lee, Huey-Ming Lee, Wuu-Yee Chen, Heng-...
WETICE
2006
IEEE
14 years 2 months ago
Autonomous Information Unit: Why Making Data Smart Can Also Make Data Secured?
In this paper, we introduce a new fine-grain distributed information protection mechanism which can self-protect, self-discover, self-organize, and selfmanage. In our approach, we...
Edward T. Chow
TRUST
2009
Springer
14 years 3 months ago
Remote Attestation of Attribute Updates and Information Flows in a UCON System
UCON is a highly flexible and expressive usage control model which allows an object owner to specify detailed usage control policies to be evaluated on a remote platform. Assuranc...
Mohammad Nauman, Masoom Alam, Xinwen Zhang, Tamlee...