149
click to vote
SACMAT
15 years 8 months ago
2009 ACM
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
129
click to vote
SACMAT
15 years 8 months ago
2009 ACM
In both the commercial and defense sectors a compelling need is emerging for highly dynamic, yet risk optimized, sharing of information across traditional organizational boundarie...
121
click to vote
SACMAT
15 years 8 months ago
2009 ACM
The recent emergence of mandatory access (MAC) enforcement for virtual machine monitors (VMMs) presents an opportunity to enforce a security goal over all its virtual machines (VM...
108
click to vote
SACMAT
15 years 8 months ago
2009 ACM
We develop the foundations for a theory of Group-Centric Secure Information Sharing (g-SIS), characterize a specific family of models in this arena and identify several direction...
128
click to vote
SACMAT
15 years 8 months ago
2009 ACM
Many access control policy languages, e.g., XACML, allow a policy to contain multiple sub-policies, and the result of the policy on a request is determined by combining the result...
|