Sciweavers

715 search results - page 60 / 143
» On Run-Time Enforcement of Policies
Sort
View
SIGCOMM
2009
ACM
14 years 3 months ago
Delegating network security with more information
Network security is gravitating towards more centralized control. Strong centralization places a heavy burden on the administrator who has to manage complex security policies and ...
Jad Naous, Ryan Stutsman, David Mazières, N...
CCS
2007
ACM
14 years 3 months ago
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
SACMAT
2004
ACM
14 years 2 months ago
On the role of roles: from role-based to role-sensitive access control
This paper maintains that for an access-control mechanism to support a wide range of policies, it is best to dispense with any built-in semantics for roles in the mechanism itself...
Xuhui Ao, Naftaly H. Minsky
DBSEC
2009
130views Database» more  DBSEC 2009»
13 years 10 months ago
Implementing Reflective Access Control in SQL
Reflective Database Access Control (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege in an access control ...
Lars E. Olson, Carl A. Gunter, William R. Cook, Ma...
OOPSLA
2010
Springer
13 years 7 months ago
Task types for pervasive atomicity
Atomic regions are an important concept in correct concurrent programming: since atomic regions can be viewed as having executed in a single step, atomicity greatly reduces the nu...
Aditya Kulkarni, Yu David Liu, Scott F. Smith