Sciweavers

378 search results - page 34 / 76
» Programming with Explicit Security Policies
Sort
View
CORR
2010
Springer
146views Education» more  CORR 2010»
13 years 7 months ago
Liberalizing Dependency
Abstract. The dependency core calculus (DCC), a simple extension of the computational lambda calculus, captures a common notion of dependency that arises in many programming langua...
Avik Chaudhuri
LICS
2003
IEEE
14 years 26 days ago
Logic in Access Control
Access control is central to security in computer systems. Over the years, there have been many efforts to explain and to improve access control, sometimes with logical ideas and ...
Martín Abadi
FLOPS
2006
Springer
13 years 11 months ago
Soutei, a Logic-Based Trust-Management System
We describe the design and implementation of a trust-management system Soutei, a dialect of Binder, for access control in distributed systems. Soutei policies and credentials are w...
Andrew Pimlott, Oleg Kiselyov
ACISP
2003
Springer
14 years 25 days ago
A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems
Abstract. This paper examines the access control requirements of distributed health care information networks. Since the electronic sharing of an individual’s personal health inf...
Jason Reid, Ian Cheong, Matthew Henricksen, Jason ...
ACSAC
2001
IEEE
13 years 11 months ago
A Regulated Approach to Certificate Management
Traditionally, creation and revocation of certificates are performed manually, by trusted agents, under conditions that are rarely formalized. This approach to certificate managem...
Victoria Ungureanu