Sciweavers

769 search results - page 38 / 154
» Policy Storage for Role-Based Access Control Systems
Sort
View
ESORICS
2007
Springer
14 years 22 days ago
Efficient Proving for Practical Distributed Access-Control Systems
We present a new technique for generating a formal proof that an access request satisfies accesscontrol policy, for use in logic-based access-control frameworks. Our approach is t...
Lujo Bauer, Scott Garriss, Michael K. Reiter
SACMAT
2004
ACM
14 years 2 months ago
On the role of roles: from role-based to role-sensitive access control
This paper maintains that for an access-control mechanism to support a wide range of policies, it is best to dispense with any built-in semantics for roles in the mechanism itself...
Xuhui Ao, Naftaly H. Minsky
ACSAC
2006
IEEE
14 years 2 months ago
Shamon: A System for Distributed Mandatory Access Control
We define and demonstrate an approach to securing distributed computation based on a shared reference monitor (Shamon) that enforces mandatory access control (MAC) policies acros...
Jonathan M. McCune, Trent Jaeger, Stefan Berger, R...
LISA
2007
13 years 11 months ago
Policy-Driven Management of Data Sets
Contemporary storage systems separate the management of data from the management of the underlying physical storage media used to store that data. This separation is artificial an...
Jim Holl, Kostadis Roussos, Jim Voll
SACMAT
2009
ACM
14 years 3 months ago
Dynamic mandatory access control for multiple stakeholders
In this paper, we present a mandatory access control system that uses input from multiple stakeholders to compose policies based on runtime information. In the emerging ubiquitous...
Vikhyath Rao, Trent Jaeger