Sciweavers

427 search results - page 69 / 86
» Implementing Real-Time Update of Access Control Policies
Sort
View
PET
2010
Springer
14 years 22 days ago
Private Information Disclosure from Web Searches
As the amount of personal information stored at remote service providers increases, so does the danger of data theft. When connections to remote services are made in the clear and ...
Claude Castelluccia, Emiliano De Cristofaro, Danie...
MIDDLEWARE
2010
Springer
13 years 7 months ago
Kevlar: A Flexible Infrastructure for Wide-Area Collaborative Applications
Abstract. While Web Services ensure interoperability and extensibility for networked applications, they also complicate the deployment of highly collaborative systems, such as virt...
Qi Huang, Daniel A. Freedman, Ymir Vigfusson, Ken ...
CCS
2005
ACM
14 years 2 months ago
Automatic placement of authorization hooks in the linux security modules framework
We present a technique for automatic placement of authorization hooks, and apply it to the Linux security modules (LSM) framework. LSM is a generic framework which allows diverse ...
Vinod Ganapathy, Trent Jaeger, Somesh Jha
VLDB
2004
ACM
113views Database» more  VLDB 2004»
14 years 2 months ago
Auditing Compliance with a Hippocratic Database
We introduce an auditing framework for determining whether a database system is adhering to its data disclosure policies. Users formulate audit expressions to specify the (sensiti...
Rakesh Agrawal, Roberto J. Bayardo Jr., Christos F...
DBSEC
2000
95views Database» more  DBSEC 2000»
13 years 10 months ago
Wrappers - a mechanism to support state-based authorisation in Web applications
The premises of this paper are 1) security is application dependent because application semantics directly influence proper protection; but 2) applications are generally too compl...
Martin S. Olivier, Ehud Gudes