Sciweavers

3811 search results - page 109 / 763
» The Safe-Tcl Security Model
Sort
View
136
Voted
JTAER
2006
100views more  JTAER 2006»
15 years 4 months ago
A Model for Improving e-Security in Australian Universities
As universities seek to adopt increased e-business, e-commerce and e-learning initiates, the overall approach taken for security management within the organisation plays an increa...
Lauren May, Tim Lane
CRYPTO
2009
Springer
119views Cryptology» more  CRYPTO 2009»
15 years 11 months ago
How Risky Is the Random-Oracle Model?
RSA-FDH and many other schemes secure in the Random-Oracle Model (ROM) require a hash function with output size larger than standard sizes. We show that the random-oracle instanti...
Gaëtan Leurent, Phong Q. Nguyen
125
Voted
SACMAT
2004
ACM
15 years 10 months ago
X-GTRBAC admin: a decentralized administration model for enterprise wide access control
Access control in enterprises is a key research area in the realm of Computer Security because of the unique needs of the target enterprise. As the enterprise typically has large ...
Rafae Bhatti, James Joshi, Elisa Bertino, Arif Gha...
171
Voted
CSFW
2012
IEEE
13 years 7 months ago
Gran: Model Checking Grsecurity RBAC Policies
—Role-based Access Control (RBAC) is one of the most widespread security mechanisms in use today. Given the growing complexity of policy languages and access control systems, ver...
Michele Bugliesi, Stefano Calzavara, Riccardo Foca...
IJNSEC
2007
127views more  IJNSEC 2007»
15 years 4 months ago
A Web-based Multilayer Access Control Model for Multimedia Applications in MPEG-7
This paper presents a Criterion-Based Role-Based Access Control model in which secure permissions (SP), secure operations (SOp), secure objects (SOb), and secure users (SU) are in...
Leon Pan