Sciweavers

712 search results - page 97 / 143
» Secure Data Management in Trusted Computing
Sort
View
CCS
2007
ACM
14 years 3 months ago
Managing RBAC states with transitive relations
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Chaoyi Pang, David P. Hansen, Anthony J. Maeder
CCS
2008
ACM
13 years 11 months ago
A class of probabilistic models for role engineering
Role Engineering is a security-critical task for systems using role-based access control (RBAC). Different role-mining approaches have been proposed that attempt to automatically ...
Mario Frank, David A. Basin, Joachim M. Buhmann
DBSEC
2008
196views Database» more  DBSEC 2008»
13 years 10 months ago
Shared and Searchable Encrypted Data for Untrusted Servers
Current security mechanisms are not suitable for organisations that outsource their data management to untrusted servers. Encrypting and decrypting sensitive data at the client si...
Changyu Dong, Giovanni Russello, Naranker Dulay
SIGUCCS
2003
ACM
14 years 2 months ago
Higher education ERP: a framework to reduce the pain
Higher Education Institutions are now spending a significant portion of their budget to implement and maintain modern Enterprise Resource Planning (ERP) solutions. ERP is a softwa...
Kris T. Pegah, Mahmoud Pegah, Terry M. Dillow
PLDI
2006
ACM
14 years 3 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober