Sciweavers

CCS
2010
ACM
13 years 11 months ago
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
Cloud computing, as an emerging computing paradigm, enables users to remotely store their data into a cloud so as to enjoy scalable services on-demand. Especially for small and me...
Guojun Wang, Qin Liu, Jie Wu
DAGSTUHL
2001
14 years 25 days ago
A Language-Based Approach to Security
Abstract. Language-based security leverages program analysis and program rewriting to enforce security policies. The approach promises efficient enforcement of fine-grained access ...
Fred B. Schneider, J. Gregory Morrisett, Robert Ha...
FTDCS
2004
IEEE
14 years 3 months ago
Towards Supporting Fine-Grained Access Control for Grid Resources
The heterogeneous nature and independent administration of geographically dispersed resources in Grid, demand the need for access control using fine-grained policies. In this pape...
Elisa Bertino, Pietro Mazzoleni, Bruno Crispo, Swa...
ACSAC
2009
IEEE
14 years 6 months ago
Java Security: A Ten Year Retrospective
— The first edition of Java (both the language and the platform) was released in 1995, which contained the all-ornothing security access model. A mid-1997 paper I published in IE...
Li Gong
SIGMOD
2004
ACM
160views Database» more  SIGMOD 2004»
14 years 11 months ago
Extending Query Rewriting Techniques for Fine-Grained Access Control
Current day database applications, with large numbers of users, require fine-grained access control mechanisms, at the level of individual tuples, not just entire relations/views,...
Shariq Rizvi, Alberto O. Mendelzon, S. Sudarshan, ...
SIGMOD
2006
ACM
124views Database» more  SIGMOD 2006»
14 years 11 months ago
Redundancy and information leakage in fine-grained access control
The current SQL standard for access control is coarse grained, in that it grants access to all rows of a table or none. Fine-grained access control, which allows control of access...
Govind Kabra, Ravishankar Ramamurthy, S. Sudarshan
ICDE
2005
IEEE
137views Database» more  ICDE 2005»
15 years 24 days ago
Extending Relational Database Systems to Automatically Enforce Privacy Policies
Databases are at the core of successful businesses. Due to the voluminous stores of personal data being held by companies today, preserving privacy has become a crucial requiremen...
Rakesh Agrawal, Paul Bird, Tyrone Grandison, Jerry...