Sciweavers

189 search results - page 18 / 38
» Testing and Analysis of Access Control Policies
Sort
View
CCS
2011
ACM
12 years 8 months ago
Automatic error finding in access-control policies
Verifying that access-control systems maintain desired security properties is recognized as an important problem in security. Enterprise access-control systems have grown to prote...
Karthick Jayaraman, Vijay Ganesh, Mahesh V. Tripun...
ACSAC
2009
IEEE
13 years 6 months ago
RoleVAT: Visual Assessment of Practical Need for Role Based Access Control
Abstract--Role based access control (RBAC) is a powerful security administration concept that can simplify permission assignment management. Migration to and maintenance of RBAC re...
Dana Zhang, Kotagiri Ramamohanarao, Steven Verstee...
COMCOM
2008
138views more  COMCOM 2008»
13 years 8 months ago
Secure content access and replication in pure P2P networks
Despite the advantages offered by pure Peer-to-Peer (P2P) networks (e.g. robustness and fault tolerance), a crucial requirement is to guarantee basic security properties, such as ...
Esther Palomar, Juan M. Estévez-Tapiador, J...
SAC
2005
ACM
14 years 2 months ago
An attribute-based access matrix model
In traditional access control models like MAC, DAC, and RBAC, authorization decisions are determined according to identities of subjects and objects, which are authenticated by a ...
Xinwen Zhang, Yingjiu Li, Divya Nalla
ACSAC
2007
IEEE
14 years 2 months ago
Fine-Grained Information Flow Analysis and Enforcement in a Java Virtual Machine
We have implemented an information flow framework for the Java Virtual Machine that combines static and dynamic techniques to capture not only explicit flows, but also implicit ...
Deepak Chandra, Michael Franz