140
Voted
SACMAT
15 years 7 months ago
2009 ACM
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
120
Voted
SACMAT
15 years 7 months ago
2009 ACM
In both the commercial and defense sectors a compelling need is emerging for highly dynamic, yet risk optimized, sharing of information across traditional organizational boundarie...
115
Voted
SACMAT
15 years 7 months ago
2009 ACM
The recent emergence of mandatory access (MAC) enforcement for virtual machine monitors (VMMs) presents an opportunity to enforce a security goal over all its virtual machines (VM...
105
Voted
SACMAT
15 years 7 months ago
2009 ACM
We develop the foundations for a theory of Group-Centric Secure Information Sharing (g-SIS), characterize a specific family of models in this arena and identify several direction...
123
Voted
SACMAT
15 years 7 months ago
2009 ACM
Many access control policy languages, e.g., XACML, allow a policy to contain multiple sub-policies, and the result of the policy on a request is determined by combining the result...
|