Sciweavers

579 search results - page 70 / 116
» Policies, Models, and Languages for Access Control
Sort
View
CCS
2010
ACM
13 years 7 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
EUROSEC
2009
ACM
14 years 2 months ago
QuanTM: a quantitative trust management system
Quantitative Trust Management (QTM) provides a dynamic interpretation of authorization policies for access control decisions based on upon evolving reputations of the entities inv...
Andrew G. West, Adam J. Aviv, Jian Chang, Vinayak ...
MMMACNS
2010
Springer
13 years 6 months ago
Group-Centric Models for Secure and Agile Information Sharing
Abstract. To share information and retain control (share-but-protect) is a classic cyber security problem for which effective solutions continue to be elusive. Where the patterns o...
Ravi S. Sandhu, Ram Krishnan, Jianwei Niu, William...
PLDI
2009
ACM
14 years 2 months ago
A language for information flow: dynamic tracking in multiple interdependent dimensions
This paper presents λI , a language for dynamic tracking of information flow across multiple, interdependent dimensions of information. Typical dimensions of interest are integr...
Avraham Shinnar, Marco Pistoia, Anindya Banerjee
ESOP
2005
Springer
14 years 1 months ago
Programming with Explicit Security Policies
Are computing systems trustworthy? To answer this, we need to know three things: what the systems are supposed to do, what they are not supposed to do, and what they actually do. A...
Andrew C. Myers