Sciweavers

12 search results - page 2 / 3
» sacmat 2006
Sort
View
SACMAT
2006
ACM
14 years 4 months ago
Secure resource description framework: an access control model
In this paper we propose an access control model for the Resource Description Framework (RDF). We argue that existing access control models, like the ones developed for securing e...
Amit Jain, Csilla Farkas
SACMAT
2006
ACM
14 years 4 months ago
Constraint generation for separation of duty
Separation of Duty (SoD) is widely recognized to be a fundamental principle in computer security. A Static SoD (SSoD) policy states that in order to have all permissions necessary...
Hong Chen, Ninghui Li
SACMAT
2006
ACM
14 years 4 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
SACMAT
2006
ACM
14 years 4 months ago
Fine-grained role-based delegation in presence of the hybrid role hierarchy
Delegation of authority is an important process that needs to be captured by any access control model. In role-based access control models, delegation of authority involves delega...
James B. D. Joshi, Elisa Bertino
SACMAT
2006
ACM
14 years 4 months ago
PRIMA: policy-reduced integrity measurement architecture
We propose an integrity measurement approach based on information flow integrity, which we call the Policy-Reduced Integrity Measurement Architecture (PRIMA). The recent availabi...
Trent Jaeger, Reiner Sailer, Umesh Shankar