Sciweavers

76 search results - page 1 / 16
» Peer-to-peer access control architecture using trusted compu...
Sort
View
SACMAT
2005
ACM
13 years 10 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang
JHSN
2006
267views more  JHSN 2006»
13 years 4 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...
OTM
2007
Springer
13 years 11 months ago
Fine Grained Access Control with Trust and Reputation Management for Globus
Abstract. We propose an integrated architecture, extending a framework for fine grained access control of Grid computational services, with an inference engine managing reputation...
Maurizio Colombo, Fabio Martinelli, Paolo Mori, Ma...
CCS
2007
ACM
13 years 11 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
ACSW
2007
13 years 6 months ago
Securing Grid Data Using Mandatory Access Controls
The main contribution of this paper is to investigate issues in using Mandatory Access Controls (MACs), namely those provided by SELinux, to secure application-level data. Particu...
Matthew Henricksen, William J. Caelli, Peter R. Cr...