Sciweavers

IEEEIAS
2007
IEEE
13 years 11 months ago
Modelling Quality of Protection in Outsourced Business Processes
There is a large number of research papers and standards dedicated to security for outsourced data. Yet, most papers propose new controls to access and protect the data rather tha...
Fabio Massacci, Artsiom Yautsiukhin
IEEEIAS
2007
IEEE
13 years 11 months ago
SARBAC07: A Scoped Administration Model for RBAC with Hybrid Hierarchy
Recently, administration of RBAC systems using a role-based approach has become very appealing because of the benefits that such an approach typically brings. This approach uses R...
Yue Zhang 0002, James B. D. Joshi
IEEEIAS
2007
IEEE
13 years 11 months ago
Metrics-based Evaluation of Slicing Obfuscations
An obfuscation aims to transform a program, without affecting its functionality, so that some secret data within the program can be hidden for as long as possible from an adversar...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...
IEEEIAS
2007
IEEE
13 years 11 months ago
Team Edit Automata for Testing Security Property
This paper introduces a mathematical model, called Team Edit Automata, for evaluating software security properties. We use the model to describe security properties and their corr...
Zhenrong Yang, Aiman Hanna, Mourad Debbabi
IEEEIAS
2007
IEEE
13 years 11 months ago
A Secure Storage Service for the gLite Middleware
Diego Scardaci, Giordano Scuderi
IEEEIAS
2007
IEEE
13 years 11 months ago
Addressing privacy issues in CardSpace
CardSpace (formerly known as InfoCard) is a Digital Identity Management system that has recently been adopted by Microsoft. In this paper we identify two security flaws in CardSp...
Waleed A. Alrodhan, Chris J. Mitchell
IEEEIAS
2007
IEEE
13 years 11 months ago
A Purpose-Based Access Control Model
: Achieving privacy preservation in a data-sharing computing environment is becoming a challenging problem. Some organisations may have published privacy policies, which promise pr...
Naikuo Yang, Howard Barringer, Ning Zhang
IEEEIAS
2007
IEEE
13 years 11 months ago
Cyber Threat Trend Analysis Model Using HMM
Prevention, not reaction, is normally recognized as one of the best defense strategy against malicious hackers or attackers. The desire of deploying better prevention mechanism mo...
Do-Hoon Kim, Taek Lee, Sung-Oh David Jung, Hoh Pet...