Sciweavers

769 search results - page 45 / 154
» Policy Storage for Role-Based Access Control Systems
Sort
View
ICFP
2003
ACM
14 years 8 months ago
A static type system for JVM access control
This paper presents a static type system for JAVA Virtual Machine (JVM) code that enforces an access control mechanism similar to the one found, for example, in a JAVA implementat...
Tomoyuki Higuchi, Atsushi Ohori
PKC
2009
Springer
210views Cryptology» more  PKC 2009»
14 years 9 months ago
Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials
In this work, we consider the task of allowing a content provider to enforce complex access control policies on oblivious protocols conducted with anonymous users. As our primary ...
Scott E. Coull, Matthew Green, Susan Hohenberger
HICSS
2010
IEEE
155views Biometrics» more  HICSS 2010»
14 years 3 months ago
Experiences Validating the Access Policy Tool in Industrial Settings
—The Access Policy Tool (APT) analyzes the firewall configuration in an enterprise network for compliance with global access policy, e.g., such as describes the industry’s be...
David M. Nicol, William H. Sanders, Mouna Seri, Sa...
CCS
2007
ACM
14 years 3 months ago
Protecting users from "themselves"
Computer usage and threat models have changed drastically since the advent of access control systems in the 1960s. Instead of multiple users sharing a single file system, each us...
William Enck, Sandra Rueda, Joshua Schiffman, Yoge...
POLICY
2009
Springer
14 years 3 months ago
In Vivo Evolution of Policies that Govern a Distributed System
This paper addresses an important open problem confronting any decentralized and stateful access control (AC) mechanism for networked systems, particularly when the system at hand...
Constantin Serban, Naftaly H. Minsky