Sciweavers

882 search results - page 141 / 177
» On the Negotiation of Access Control Policies
Sort
View
NDSS
2009
IEEE
14 years 2 months ago
Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems
Host compromise is a serious computer security problem today. To better protect hosts, several Mandatory Access Control systems, such as Security Enhanced Linux (SELinux) and AppA...
Hong Chen, Ninghui Li, Ziqing Mao
ICMCS
2007
IEEE
228views Multimedia» more  ICMCS 2007»
14 years 2 months ago
Dynamic Privacy in a Smart House Environment
— A smart house can be regarded as a surveillance environment in which the person being observed carries out activities that range from intimate to more public. What can be obser...
Simon Moncrieff, Svetha Venkatesh, Geoff A. W. Wes...
SP
2006
IEEE
110views Security Privacy» more  SP 2006»
14 years 1 months ago
Privacy and Contextual Integrity: Framework and Applications
Contextual integrity is a conceptual framework for understanding privacy expectations and their implications developed in the literature on law, public policy, and political philo...
Adam Barth, Anupam Datta, John C. Mitchell, Helen ...
SWS
2004
ACM
14 years 1 months ago
Trust but verify: authorization for web services
Through web service technology, distributed applications can be built in a exible manner, bringing tremendous power to applications on the web. However, this exibility poses sig...
Christian Skalka, Xiaoyang Sean Wang
EUC
2004
Springer
14 years 1 months ago
Securing Communications in the Smart Home
As the vision of ubiquitous computing becomes reality smart devices are embedded into our surroundings and domestic appliances providing services transparently. The nature of such ...
Patroklos G. Argyroudis, Donal O'Mahony