177
click to vote
SACMAT
15 years 10 months ago
2009 ACM
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
150
click to vote
SACMAT
15 years 10 months ago
2009 ACM
In both the commercial and defense sectors a compelling need is emerging for highly dynamic, yet risk optimized, sharing of information across traditional organizational boundarie...
149
click to vote
SACMAT
15 years 10 months ago
2009 ACM
The recent emergence of mandatory access (MAC) enforcement for virtual machine monitors (VMMs) presents an opportunity to enforce a security goal over all its virtual machines (VM...
133
click to vote
SACMAT
15 years 10 months ago
2009 ACM
We develop the foundations for a theory of Group-Centric Secure Information Sharing (g-SIS), characterize a specific family of models in this arena and identify several direction...
161
click to vote
SACMAT
15 years 10 months ago
2009 ACM
Many access control policy languages, e.g., XACML, allow a policy to contain multiple sub-policies, and the result of the policy on a request is determined by combining the result...
|