Sciweavers

45 search results - page 1 / 9
» Access Control Encryption: Enforcing Information Flow with C...
Sort
View
IFIP
2010
Springer
12 years 11 months ago
Cryptographic Enforcement of Role-Based Access Control
Many cryptographic schemes have been designed to enforce information flow policies. However, enterprise security requirements are often better encoded, or can only be encoded, usin...
Jason Crampton
ENTCS
2007
102views more  ENTCS 2007»
13 years 4 months ago
Selective Data Encryption in Outsourced Dynamic Environments
The amount of information held by organizations’ databases is increasing very quickly. A recently proposed solution to the problem of data management, which is becoming increasi...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
CCS
2007
ACM
13 years 10 months ago
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
ASIAN
2007
Springer
129views Algorithms» more  ASIAN 2007»
13 years 8 months ago
An Integrated Model for Access Control and Information Flow Requirements
Current information systems are more and more complex. They require more interactions between different components and users. So, ensuring system security must not be limited to us...
Samiha Ayed, Nora Cuppens-Boulahia, Fréd&ea...
ESOP
2010
Springer
14 years 1 months ago
Enforcing Stateful Authorization and Information Flow Policies in Fine
Proving software free of security bugs is hard. Languages that ensure that programs correctly enforce their security policies would help, but, to date, no security-typed language h...
Nikhil Swamy, Juan Chen and Ravi Chugh