Sciweavers

9 search results - page 1 / 2
» A Chinese wall security model for decentralized workflow sys...
Sort
View
CCS
2001
ACM
13 years 8 months ago
A Chinese wall security model for decentralized workflow systems
Keywords
Vijayalakshmi Atluri, Soon Ae Chun, Pietro Mazzole...
POLICY
2007
Springer
13 years 11 months ago
Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall
We present a discretionary access control framework that can be used to control a principal’s ability to link information from two or more audit records and compromise a user’...
Apu Kapadia, Prasad Naldurg, Roy H. Campbell
SP
1989
IEEE
160views Security Privacy» more  SP 1989»
13 years 9 months ago
The Chinese Wall Security Policy
Everyone who has seen the movie Wall Street will have seen a commercial security policy in action. The recent work of Clark and Wilson and the WIPCIS initiative (the Workshop on I...
D. F. C. Brewer, M. J. Nash
SP
1996
IEEE
140views Security Privacy» more  SP 1996»
13 years 9 months ago
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification
In the proposed mandatory access control model, arbitrary label changing policies can be expressed. The relatively simple model can capture a wide variety of security policies, in...
Simon N. Foley, Li Gong, Xiaolei Qian
AICCSA
2008
IEEE
222views Hardware» more  AICCSA 2008»
13 years 7 months ago
Managing access and flow control requirements in distributed workflows
Abstract. Workflows are operational business processes. Workfow Management Systems (WFMS) are concerned with the control and coordination of these workflows. In recent years, there...
Samiha Ayed, Nora Cuppens-Boulahia, Fréd&ea...