Sciweavers

CODASPY
2012
12 years 8 months ago
Identifying native applications with high assurance
Main stream operating system kernels lack a strong and reliable mechanism for identifying the running processes and binding them to the corresponding executable applications. In t...
Hussain M. J. Almohri, Danfeng (Daphne) Yao, Denni...
IACR
2011
292views more  IACR 2011»
13 years 2 days ago
Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones
—Contactless technology is widely used in security sensitive applications, including identification, payment and access-control systems. Near Field Communication (NFC) is a shor...
Lishoy Francis, Gerhard P. Hancke, Keith Mayes, Ko...
CHI
2011
ACM
13 years 4 months ago
More than skin deep: measuring effects of the underlying model on access-control system usability
In access-control systems, policy rules conflict when they prescribe different decisions (ALLOW or DENY) for the same access. We present the results of a user study that demonstr...
Robert W. Reeder, Lujo Bauer, Lorrie Faith Cranor,...
ICDIM
2010
IEEE
13 years 10 months ago
Risk management in dynamic role based access control systems
We present a risk management framework which allows to reason about and manage risk for role based access control systems. The framework expresses essential characteristics of risk...
Ji Ma, Kamel Adi, Luigi Logrippo, Serge Mankovski
IAT
2010
IEEE
13 years 10 months ago
Risk Analysis in Access Control Systems Based on Trust Theories
There is a need for research on the scientific base and engineering requirements for building trustworthy systems in dynamic environments. To address this need, we study risk analy...
J. Ma, Luigi Logrippo, Kamel Adi, Serge Mankovski
ENTCS
2007
113views more  ENTCS 2007»
14 years 12 days ago
On the Decidability of the Safety Problem for Access Control Policies
An access control system regulates the rights of users to gain access to resources in accordance with a specified policy. The rules in this policy may interact in a way that is n...
E. Kleiner, T. Newcomb
ESORICS
2008
Springer
14 years 2 months ago
On the Security of Delegation in Access Control Systems
Delegation is a mechanism that allows a user A to act on another user B's behalf by making B's access rights available to A. It is well recognized as an important mechani...
Qihua Wang, Ninghui Li, Hong Chen
SP
1997
IEEE
134views Security Privacy» more  SP 1997»
14 years 4 months ago
A Logical Language for Expressing Authorizations
A major drawback of existing access control systems is that they have all been developed with a specific access control policy in mind. This means that all protection requirement...
Sushil Jajodia, Pierangela Samarati, V. S. Subrahm...
COLCOM
2009
IEEE
14 years 5 months ago
Aggregating uncertain access risk estimations from different sources invited paper
Risk-based access control raises some novel problems that have not yet been investigated. In particular, the ability to aggregate uncertain risk estimations from different experts...
Qun Ni, Elisa Bertino
ACSAC
2003
IEEE
14 years 5 months ago
Usable Access Control for the World Wide Web
While publishing content on the World Wide Web has moved within reach of the non-technical mainstream, controlling access to published content still requires expertise in Web serv...
Dirk Balfanz