Sciweavers

DBSEC
2006
115views Database» more  DBSEC 2006»
14 years 25 days ago
Creating Objects in the Flexible Authorization Framework
Access control is a crucial concern to build secure IT systems and, more specifically, to protect the confidentiality of information. However, access control is necessary, but not ...
Nicola Zannone, Sushil Jajodia, Duminda Wijesekera
DBSEC
2006
124views Database» more  DBSEC 2006»
14 years 25 days ago
Consolidating the Access Control of Composite Applications and Workflows
The need for enterprise application integration projects leads to complex composite applications. For the sake of security and efficiency, consolidated access control policies for ...
Martin Wimmer, Alfons Kemper, Maarten Rits, Volkma...
DBSEC
2006
131views Database» more  DBSEC 2006»
14 years 25 days ago
Interactive Analysis of Attack Graphs Using Relational Queries
Abstract. Attack graph is important in defending against well-orchestrated network intrusions. However, the current analysis of attack graphs requires an algorithm to be developed ...
Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajod...
DBSEC
2006
107views Database» more  DBSEC 2006»
14 years 25 days ago
From Business Process Choreography to Authorization Policies
Abstract. A choreography specifies the interactions between the resources of multiple collaborating parties at design time. The runtime management of authorization policies in orde...
Philip Robinson, Florian Kerschbaum, Andreas Schaa...
DBSEC
2006
122views Database» more  DBSEC 2006»
14 years 25 days ago
A Framework for Flexible Access Control in Digital Library Systems
Traditional access control models are often found to be inadequate for digital libraries. This is because the user population for digital libraries is very dynamic and not complete...
Indrajit Ray, Sudip Chakraborty
DBSEC
2006
144views Database» more  DBSEC 2006»
14 years 25 days ago
Policy Classes and Query Rewriting Algorithm for XML Security Views
Most state-of-the-art approaches of securing XML documents are based on a partial annotation of an XML tree with security labels which are later propagated to unlabeled nodes of th...
Nataliya Rassadko
DBSEC
2006
134views Database» more  DBSEC 2006»
14 years 25 days ago
Aggregation Queries in the Database-As-a-Service Model
In the Database-As-a-Service (DAS) model, clients store their database contents at servers belonging to potentially untrusted service providers. To maintain data confidentiality, ...
Einar Mykletun, Gene Tsudik
DBSEC
2006
73views Database» more  DBSEC 2006»
14 years 25 days ago
Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems
Saket Kaushik, William H. Winsborough, Duminda Wij...
DBSEC
2006
134views Database» more  DBSEC 2006»
14 years 25 days ago
Notarized Federated Identity Management for Web Services
We propose a notarized federated identity management model that supports efficient user authentication when providers are unknown to each other. Our model introduces a notary servi...
Michael T. Goodrich, Roberto Tamassia, Danfeng Yao
DBSEC
2006
125views Database» more  DBSEC 2006»
14 years 25 days ago
Aspect-Oriented Risk Driven Development of Secure Applications
Abstract. Security breaches seldom occur because of faulty security mechanisms. Often times, security mechanisms are incorrectly incorporated in an application which allows them to...
Geri Georg, Siv Hilde Houmb, Indrakshi Ray