Sciweavers

692 search results - page 33 / 139
» Shamon: A System for Distributed Mandatory Access Control
Sort
View
USENIX
2007
13 years 9 months ago
From Trusted to Secure: Building and Executing Applications That Enforce System Security
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be used to ensure system-wide data confidentiality and integrity. These protections...
Boniface Hicks, Sandra Rueda, Trent Jaeger, Patric...
RTCSA
2005
IEEE
14 years 28 days ago
Service Delivery in Context Aware Environments: Lookup and Access Control Issues
Large-scale distributed systems, such as ubiquitous computing environments, require a service delivery mechanism in order to keep track of the vast set of services offered and mak...
Maria Riaz, Saad Liaquat Kiani, Sungyoung Lee, San...
ICFP
2006
ACM
14 years 7 months ago
Access control in a core calculus of dependency
The Dependency Core Calculus (DCC) is an extension of the computational lambda calculus that was designed in order to capture the notion of dependency that arises in information-f...
Martín Abadi
POLICY
2009
Springer
14 years 1 months ago
In Vivo Evolution of Policies that Govern a Distributed System
This paper addresses an important open problem confronting any decentralized and stateful access control (AC) mechanism for networked systems, particularly when the system at hand...
Constantin Serban, Naftaly H. Minsky
ICDCSW
2003
IEEE
14 years 20 days ago
Privilege Delegation and Agent-Oriented Access Control in Naplet
Access control in existing Java-based mobile agents is mostly based on code source due to limitations of early Java security architecture. That is, authorization is based on where...
Cheng-Zhong Xu, Song Fu