Sciweavers

660 search results - page 57 / 132
» History-Based Access Control and Secure Information Flow
Sort
View
WORM
2004
13 years 10 months ago
ACT: attachment chain tracing scheme for email virus detection and control
Modern society is highly dependent on the smooth and safe flow of information over communication and computer networks. Computer viruses and worms pose serious threats to the soci...
Jintao Xiong
CONTEXT
2003
Springer
14 years 1 months ago
A Generic Framework for Context-Based Distributed Authorizations
In conventional security systems, protected resources such as documents, hardware devices and software applications follow an On/Off access policy. On, allows to grant access and ...
Ghita Kouadri Mostéfaoui, Patrick Bré...
DMKD
2003
ACM
108views Data Mining» more  DMKD 2003»
14 years 2 months ago
Dynamic inference control
An inference problem exists in a multilevel database if knowledge of some objects in the database allows information with a higher security level to be inferred. Many such inferen...
Jessica Staddon
CODES
2007
IEEE
14 years 3 months ago
Secure FPGA circuits using controlled placement and routing
In current Field-Programmable-Logic Architecture (FPGA) design flows, it is very hard to control the routing of submodules. It is thus very hard to make an identical copy of an ex...
Pengyuan Yu, Patrick Schaumont
SACMAT
2009
ACM
14 years 3 months ago
Foundations for group-centric secure information sharing models
We develop the foundations for a theory of Group-Centric Secure Information Sharing (g-SIS), characterize a specific family of models in this arena and identify several direction...
Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William...