Sciweavers

IEEEIAS
2007
IEEE
14 years 6 months ago
SARBAC07: A Scoped Administration Model for RBAC with Hybrid Hierarchy
Recently, administration of RBAC systems using a role-based approach has become very appealing because of the benefits that such an approach typically brings. This approach uses R...
Yue Zhang 0002, James B. D. Joshi
IEEEIAS
2007
IEEE
14 years 6 months ago
Metrics-based Evaluation of Slicing Obfuscations
An obfuscation aims to transform a program, without affecting its functionality, so that some secret data within the program can be hidden for as long as possible from an adversar...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...
IEEEIAS
2007
IEEE
14 years 6 months ago
Team Edit Automata for Testing Security Property
This paper introduces a mathematical model, called Team Edit Automata, for evaluating software security properties. We use the model to describe security properties and their corr...
Zhenrong Yang, Aiman Hanna, Mourad Debbabi
IEEEIAS
2007
IEEE
14 years 6 months ago
A Secure Storage Service for the gLite Middleware
Diego Scardaci, Giordano Scuderi
IEEEIAS
2007
IEEE
14 years 6 months ago
Addressing privacy issues in CardSpace
CardSpace (formerly known as InfoCard) is a Digital Identity Management system that has recently been adopted by Microsoft. In this paper we identify two security flaws in CardSp...
Waleed A. Alrodhan, Chris J. Mitchell
IEEEIAS
2007
IEEE
14 years 6 months ago
A Purpose-Based Access Control Model
: Achieving privacy preservation in a data-sharing computing environment is becoming a challenging problem. Some organisations may have published privacy policies, which promise pr...
Naikuo Yang, Howard Barringer, Ning Zhang
IEEEIAS
2007
IEEE
14 years 6 months ago
Cyber Threat Trend Analysis Model Using HMM
Prevention, not reaction, is normally recognized as one of the best defense strategy against malicious hackers or attackers. The desire of deploying better prevention mechanism mo...
Do-Hoon Kim, Taek Lee, Sung-Oh David Jung, Hoh Pet...
IEEECIT
2007
IEEE
14 years 6 months ago
SiteRank-Based Crawling Ordering Strategy for Search Engines
Search engines are playing a more and more important role in discovering information nowadays. Due to limitations of time-consuming, network bandwidth and hardwares, we cannot obt...
Qiancheng Jiang, Yan Zhang
IEEECIT
2007
IEEE
14 years 6 months ago
Indirect Tag Search Mechanism for Instruction Window Energy Reduction
Instruction window is a key component which extracts Instruction Level Parallelism (ILP) in modern out-of-order microprocessors. In order to exploit ILP for improving processor pe...
Shingo Watanabe, Akihiro Chiyonobu, Toshinori Sato