Sciweavers

769 search results - page 80 / 154
» Policy Storage for Role-Based Access Control Systems
Sort
View
ACSAC
2006
IEEE
14 years 3 months ago
A Module System for Isolating Untrusted Software Extensions
With the recent advent of dynamically extensible software systems, in which software extensions may be dynamically loaded into the address space of a core application to augment i...
Philip W. L. Fong, Simon A. Orr
ICPADS
2008
IEEE
14 years 3 months ago
An Efficient Policy System for Body Sensor Networks
Body sensor networks (BSNs) have become a promising technology for healthcare, in which biosensors continuously monitor physiological parameters of a user. Distinct from conventio...
Yanmin Zhu, Sye Loong Keoh, Morris Sloman, Emil Lu...
USENIX
2001
13 years 10 months ago
Integrating Flexible Support for Security Policies into the Linux Operating System
The protection mechanisms of current mainstream operating systems are inadequate to support confidentiality and integrity requirements for end systems. Mandatory access control (M...
Peter Loscocco, Stephen Smalley
SRDS
2005
IEEE
14 years 2 months ago
Enforcing Enterprise-wide Policies Over Standard Client-Server Interactions
We propose and evaluate a novel framework for enforcing global coordination and control policies over interacting software components in enterprise computing environments. This fra...
Zhijun He, Tuan Phan, Thu D. Nguyen
ESOP
2010
Springer
14 years 6 months ago
Enforcing Stateful Authorization and Information Flow Policies in Fine
Proving software free of security bugs is hard. Languages that ensure that programs correctly enforce their security policies would help, but, to date, no security-typed language h...
Nikhil Swamy, Juan Chen and Ravi Chugh