Sciweavers

Share
67 search results - page 1 / 14
» Automatic Generation of History-Based Access Control from In...
Sort
View
ATVA
2010
Springer
163views Hardware» more  ATVA 2010»
9 years 4 days ago
Automatic Generation of History-Based Access Control from Information Flow Specification
This paper proposes a method for automatically inserting check statements for access control into a given recursive program according to a given security specification. A history-b...
Yoshiaki Takata, Hiroyuki Seki
CASSIS
2004
Springer
9 years 5 months ago
History-Based Access Control and Secure Information Flow
Abstract. This paper addresses the problem of static checking of programs to ensure that they satisfy con´Čüdentiality policies in the presence of dynamic access control in the for...
Anindya Banerjee, David A. Naumann
MICRO
2009
IEEE
315views Hardware» more  MICRO 2009»
9 years 6 months ago
Control flow obfuscation with information flow tracking
Recent micro-architectural research has proposed various schemes to enhance processors with additional tags to track various properties of a program. Such a technique, which is us...
Haibo Chen, Liwei Yuan, Xi Wu, Binyu Zang, Bo Huan...
ACSAC
2009
IEEE
9 years 4 months ago
A Network Access Control Mechanism Based on Behavior Profiles
Abstract--Current Network Access Control (NAC) technologies manage the access of new devices into a network to prevent rogue devices from attacking network hosts or services. Typic...
Vanessa Frías-Martínez, Joseph Sherr...
ICISS
2009
Springer
8 years 9 months ago
Method-Specific Java Access Control via RMI Proxy Objects Using Annotations
We propose a novel approach for granting partial access on arbitrary objects at the granularity of methods to remote clients. The applications that we target use Remote Method Invo...
Jeff Zarnett, Patrick Lam, Mahesh V. Tripunitara
books