Sciweavers

12637 search results - page 127 / 2528
» Security for Extensible Systems
Sort
View
ACSAC
1999
IEEE
14 years 1 months ago
Security Policy Coordination for Heterogeneous Information Systems
Coordinating security policies in information enclaves is challenging due to their heterogeneity and autonomy. Administrators must reconcile the semantic diversity of data and sec...
John Hale, Pablo Galiasso, Mauricio Papa, Sujeet S...
SP
2009
IEEE
144views Security Privacy» more  SP 2009»
14 years 3 months ago
Native Client: A Sandbox for Portable, Untrusted x86 Native Code
This paper describes the design, implementation and evaluation of Native Client, a sandbox for untrusted x86 native code. Native Client aims to give browser-based applications the...
Bennet Yee, David Sehr, Gregory Dardyk, J. Bradley...
ACSAC
2002
IEEE
14 years 2 months ago
Advanced Features for Enterprise-Wide Role-Based Access Control
The administration of users and access rights in large enterprises is a complex and challenging task. Roles are a powerful concept for simplifying access control, but their implem...
Axel Kern
JCS
2010
121views more  JCS 2010»
13 years 7 months ago
Computational soundness of symbolic zero-knowledge proofs
raction of cryptographic operations by term algebras, called Dolev-Yao models, is essential in almost all tool-supported methods for proving security protocols. Recently significa...
Michael Backes, Dominique Unruh
SP
1990
IEEE
14 years 1 months ago
A VMM Security Kernel for the VAX Architecture
This paper describes the development of a virtual-machine monitor (VMM) security kernel for the VAX architecture. The paper particularly focuses on how the system's hardware,...
Paul A. Karger, Mary Ellen Zurko, Douglas W. Bonin...