Sciweavers

CCS
2010
ACM
14 years 6 months ago
Cryptographic role-based security mechanisms based on role-key hierarchy
Even though role-based access control (RBAC) can tremendously help us minimize the complexity in administering users, it is still needed to realize the notion of roles at the reso...
Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang
CCS
2010
ACM
14 years 6 months ago
A lattice-based approach to mashup security
A web mashup is a web application that integrates content from different providers to create a new service, not offered by the content providers. As mashups grow in popularity, ...
Jonas Magazinius, Aslan Askarov, Andrei Sabelfeld
CCS
2010
ACM
14 years 6 months ago
Effective trust management through a hybrid logical and relational approach
Despite a plethora of recent research regarding trust management approaches to authorization, relatively little attention has been given to exactly how these technologies can be e...
Adam J. Lee, Ting Yu, Yann Le Gall
CCS
2010
ACM
14 years 6 months ago
Attribute based data sharing with attribute revocation
Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou
IDTRUST
2010
ACM
14 years 6 months ago
Computational techniques for increasing PKI policy comprehension by human analysts
Natural-language policies found in X.509 PKI describe an organization’s stated policy as a set of requirements for trust. The widespread use of X.509 underscores the importance ...
Gabriel A. Weaver, Scott A. Rea, Sean W. Smith
IDTRUST
2010
ACM
14 years 6 months ago
Practical and secure trust anchor management and usage
Public Key Infrastructure (PKI) security depends upon secure management and usage of trust anchors. Unfortunately, widely used mechanisms, management models and usage practices re...
Carl Wallace, Geoff Beier
IDTRUST
2010
ACM
14 years 6 months ago
Biometrics-based identifiers for digital identity management
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...