Sciweavers

3605 search results - page 106 / 721
» Securing Security Policies in Autonomic Computing Systems
Sort
View
CCS
2008
ACM
13 years 10 months ago
Efficient security primitives derived from a secure aggregation algorithm
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
Haowen Chan, Adrian Perrig
ACSAC
2008
IEEE
13 years 10 months ago
Assessing Quality of Policy Properties in Verification of Access Control Policies
Access control policies are often specified in declarative languages. In this paper, we propose a novel approach, called mutation verification, to assess the quality of properties...
Evan Martin, JeeHyun Hwang, Tao Xie, Vincent C. Hu
FCS
2006
13 years 9 months ago
Cryptographic and Computational Challenges in Grid Computing
A computational grid is a large-scale distributed computing environment capable of providing dependable, consistent, pervasive, and inexpensive access to high-end computational re...
Song Y. Yan, Glyn James, Gongyi Wu
CSFW
2007
IEEE
13 years 12 months ago
A Type Discipline for Authorization in Distributed Systems
We consider the problem of statically verifying the conformance of the code of a system to an explicit authorization policy. In a distributed setting, some part of the system may ...
Cédric Fournet, Andy Gordon, Sergio Maffeis
IEEEIAS
2008
IEEE
14 years 2 months ago
Developing a Security Typed Java Servlet
: The Lack of security policy enforcement in web development languages is one of the most important challenges in web application systems development, as there is no formal check f...
Doaa Hassan, Sherif El-Kassas, Ibrahim Ziedan