Sciweavers

393 search results - page 14 / 79
» Security Architectures for Controlled Digital Information Di...
Sort
View
KES
2005
Springer
14 years 26 days ago
A Network Service Access Control Framework Based on Network Blocking Algorithm
Abstract. Currently, the major focus on the network security is securing individual components as well as preventing unauthorized access to network service. In this paper, we propo...
Jahwan Koo, Seong-Jin Ahn
SACMAT
2010
ACM
13 years 5 months ago
An architecture for enforcing end-to-end access control over web applications
The web is now being used as a general platform for hosting distributed applications like wikis, bulletin board messaging systems and collaborative editing environments. Data from...
Boniface Hicks, Sandra Rueda, Dave King 0002, Thom...
CCS
2007
ACM
14 years 1 months ago
Uclinux: a linux security module for trusted-computing-based usage controls enforcement
Usage controls allow the distributor of some information to limit how recipients of that information may use it. The Trusted Computing Group has standardized Trusted Platform Modu...
David Kyle, José Carlos Brustoloni
NSDI
2007
13 years 9 months ago
Tesseract: A 4D Network Control Plane
We present Tesseract, an experimental system that enables the direct control of a computer network that is under a single administrative domain. Tesseract’s design is based on t...
Hong Yan, David A. Maltz, T. S. Eugene Ng, Hemant ...
COOPIS
2002
IEEE
14 years 10 days ago
Object Security Attributes: Enabling Application-Specific Access Control in Middleware
This paper makes two main contributions towards establishing support for application-specific factors in middleware security mechanisms. First, it develops a simple classification...
Konstantin Beznosov