Sciweavers

35 search results - page 1 / 7
» Beyond File Permissions: Controlling User Actions
Sort
View
FASE
2008
Springer
14 years 15 days ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu
HOTOS
1999
IEEE
14 years 3 months ago
Elephant: The File System That Never Forgets
Modern file systems associate the deletion of a file with the release of the storage associated with that file, and file writes with the irrevocable change of file contents. We pr...
Douglas J. Santry, Michael J. Feeley, Norman C. Hu...
JCS
2008
119views more  JCS 2008»
13 years 10 months ago
Synthesising verified access control systems through model checking
We present a framework for evaluating and generating access control policies. The framework contains a modelling formalism called RW, which is supported by a model checking tool. ...
Nan Zhang 0003, Mark Ryan, Dimitar P. Guelev
SOSP
2003
ACM
14 years 7 months ago
Decentralized user authentication in a global file system
The challenge for user authentication in a global file system is allowing people to grant access to specific users and groups in remote administrative domains, without assuming ...
Michael Kaminsky, George Savvides, David Mazi&egra...