Sciweavers

12637 search results - page 197 / 2528
» Security for Extensible Systems
Sort
View
SP
1996
IEEE
140views Security Privacy» more  SP 1996»
14 years 1 months ago
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification
In the proposed mandatory access control model, arbitrary label changing policies can be expressed. The relatively simple model can capture a wide variety of security policies, in...
Simon N. Foley, Li Gong, Xiaolei Qian
CISSE
2008
Springer
13 years 11 months ago
Anonymity Leakage Reduction in Network Latency
Each Internet communication leaves trails here or there, that can be followed back to the user. Notably, anonymous communication schemes are purposed to hide users' identity ...
Longy O. Anyanwu, Jared Keengwe, Gladys A. Arome
KBSE
2006
IEEE
14 years 3 months ago
Effective Generation of Interface Robustness Properties for Static Analysis
A software system interacts with its environment through system interfaces. Robustness of software systems are governed by various temporal properties related to these interfaces,...
Mithun Acharya, Tanu Sharma, Jun Xu, Tao Xie
SACMAT
2009
ACM
14 years 3 months ago
Extending access control models with break-glass
Achim D. Brucker, Helmut Petritsch
CCS
2007
ACM
14 years 3 months ago
Provably secure ciphertext policy ABE
In ciphertext policy attribute-based encryption (CP-ABE), every secret key is associated with a set of attributes, and every ciphertext is associated with an access structure on a...
Ling Cheung, Calvin C. Newport