Sciweavers

860 search results - page 36 / 172
» On the Security of Delegation in Access Control Systems
Sort
View
ACSAC
2003
IEEE
14 years 2 months ago
Usable Access Control for the World Wide Web
While publishing content on the World Wide Web has moved within reach of the non-technical mainstream, controlling access to published content still requires expertise in Web serv...
Dirk Balfanz
IEEESCC
2008
IEEE
14 years 3 months ago
Adaptive Secure Access to Remote Services
Since the inception of service-oriented computing paradigm, we have witnessed a plethora of services deployed across a broad spectrum of applications, ranging from conventional RP...
Hanping Lufei, Weisong Shi, Vipin Chaudhary
RTAS
2008
IEEE
14 years 3 months ago
Access Control for Adaptive Reservations on Multi-User Systems
This paper tackles the problem of defining an appropriate access control model for multi-user systems providing adaptive resource reservations to unprivileged users. Security req...
Tommaso Cucinotta
SIGCOMM
2009
ACM
14 years 3 months ago
Resonance: dynamic access control for enterprise networks
Enterprise network security is typically reactive, and it relies heavily on host security and middleboxes. This approach creates complicated interactions between protocols and sys...
Ankur Kumar Nayak, Alex Reimers, Nick Feamster, Ru...
CCS
2009
ACM
14 years 3 months ago
Proximity-based access control for implantable medical devices
We propose a proximity-based access control scheme for implantable medical devices (IMDs). Our scheme is based on ultrasonic distancebounding and enables an implanted medical devi...
Kasper Bonne Rasmussen, Claude Castelluccia, Thoma...