Sciweavers

103 search results - page 1 / 21
» Towards a location-based mandatory access control model
Sort
View
COMPSEC
2006
97views more  COMPSEC 2006»
13 years 4 months ago
Towards a location-based mandatory access control model
With the growing use of wireless networks and mobile devices, we are moving towards an era where location information will be necessary for access control. The use of location inf...
Indrakshi Ray, Mahendra Kumar
CCS
2007
ACM
13 years 11 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
IJSEKE
2011
165views more  IJSEKE 2011»
12 years 8 months ago
Model Checking for Verification of Mandatory Access Control Models and Properties
rather wide gap in abstraction between policies and mechanisms. In this paper, we propose a general approach for property verification for MAC models. The approach defines a stan...
Vincent C. Hu, D. Richard Kuhn, Tao Xie, JeeHyun H...
ASIAN
2005
Springer
96views Algorithms» more  ASIAN 2005»
13 years 6 months ago
An Extended Mandatory Access Control Model for XML
Dong-Zhan Zhang, Yong-Sheng Xue
NTMS
2008
IEEE
13 years 11 months ago
Time and Location Based Services with Access Control
—We propose an access control model that extends RBAC (Role-Based Access Control) to take time and location into account, and use term rewriting systems to specify access control...
Clara Bertolissi, Maribel Fernández