Sciweavers

93 search results - page 3 / 19
» On Safety in Discretionary Access Control
Sort
View
DBSEC
2006
122views Database» more  DBSEC 2006»
13 years 6 months ago
Term Rewriting for Access Control
We demonstrate how access control models and policies can be represented by using term rewriting systems, and how rewriting may be used for evaluating access requests and for provi...
Steve Barker, Maribel Fernández
DBSEC
2003
115views Database» more  DBSEC 2003»
13 years 6 months ago
Administration Rights in the SDSD-System
The SDSD-system offers state-dependent access control in distributed object systems. The system enforces protocols which declare sets of activity sequences as allowed, thereby for...
Joachim Biskup, Thomas Leineweber, Joerg Parthe
MMMACNS
2010
Springer
13 years 3 months ago
Group-Centric Models for Secure and Agile Information Sharing
Abstract. To share information and retain control (share-but-protect) is a classic cyber security problem for which effective solutions continue to be elusive. Where the patterns o...
Ravi S. Sandhu, Ram Krishnan, Jianwei Niu, William...
SACMAT
2003
ACM
13 years 10 months ago
Dynamic access control: preserving safety and trust for network defense operations
We investigate the cost of changing access control policies dynamically as a response action in computer network defense. We compare and contrast the use of access lists and capab...
Prasad Naldurg, Roy H. Campbell
ESORICS
2009
Springer
14 years 5 months ago
A Privacy Preservation Model for Facebook-Style Social Network Systems
Abstract. Recent years have seen unprecedented growth in the popularity of social network systems, with Facebook being an archetypical example. The access control paradigm behind t...
Philip W. L. Fong, Mohd M. Anwar, Zhen Zhao