Sciweavers

807 search results - page 11 / 162
» Term Rewriting for Access Control
Sort
View
SACMAT
2003
ACM
14 years 19 days ago
Dynamic access control: preserving safety and trust for network defense operations
We investigate the cost of changing access control policies dynamically as a response action in computer network defense. We compare and contrast the use of access lists and capab...
Prasad Naldurg, Roy H. Campbell
SIGMOD
2004
ACM
88views Database» more  SIGMOD 2004»
14 years 7 months ago
Using Reasoning to Guide Annotation with Gene Ontology Terms in GOAT
High-quality annotation of biological data is central to bioinformatics. Annotation using terms from ontologies provides reliable computational access to data. The Gene Ontology (...
Michael Bada, Daniele Turi, Robin McEntire, Robert...
ASPLOS
2006
ACM
14 years 1 months ago
Architectural support for software-based protection
Control-Flow Integrity (CFI) is a property that guarantees program control flow cannot be subverted by a malicious adversary, even if the adversary has complete control of data m...
Mihai Budiu, Úlfar Erlingsson, Martí...
CSFW
2003
IEEE
14 years 20 days ago
Type-Based Distributed Access Control
A type system is presented that combines a weak form of information flow control, termed distributed access control in the paper, with typed cryptographic operations. The motivat...
Tom Chothia, Dominic Duggan, Jan Vitek
MEDINFO
2007
131views Healthcare» more  MEDINFO 2007»
13 years 8 months ago
Utilizing SELinux to Mandate Ultra-secure Access Control of Medical Records
Ongoing concerns have been raised over the effectiveness of information technology products and systems in maintaining privacy protection for sensitive data. The aim is to ensure ...
Peter R. Croll, Matthew Henricksen, William J. Cae...