Sciweavers

579 search results - page 36 / 116
» Security Enforcement Model for Distributed Usage Control
Sort
View
SP
2010
IEEE
152views Security Privacy» more  SP 2010»
13 years 5 months ago
Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size
The security of systems such as operating systems, hypervisors, and web browsers depend critically on reference monitors to correctly enforce their desired security policy in the ...
Jason Franklin, Sagar Chaki, Anupam Datta, Arvind ...
ACSAC
2007
IEEE
14 years 2 months ago
Retrofitting the IBM POWER Hypervisor to Support Mandatory Access Control
Server virtualization more readily enables the collocation of disparate workloads on a shared physical platform. When employed on systems across a data center, the result can be a...
Enriquillo Valdez, Reiner Sailer, Ronald Perez
SEC
2007
13 years 9 months ago
Extending Role Based Access Control Model for Distributed Multidomain Applications
This paper presents the results related to the development of a flexible domain-based access control infrastructure for distributed Grid-based Collaborative Environments and Comple...
Yuri Demchenko, Leon Gommans, Cees de Laat
JCM
2008
75views more  JCM 2008»
13 years 7 months ago
A Secure Mobile Agents Platform
Abstract--Mobile Agents is a new paradigm for distributed computing where security is very essential to the acceptance of this paradigm in a large scale distributed environment. In...
Leila Ismail
ENTCS
2006
135views more  ENTCS 2006»
13 years 7 months ago
Coordination Models Based on a Formal Model of Distributed Object Reflection
We propose a family of models of coordination of distributed object systems representing different views, with refinement relations between the different views. We start with dist...
Carolyn L. Talcott