Sciweavers

354 search results - page 4 / 71
» A permission system for secure AOP
Sort
View
CSFW
2004
IEEE
15 years 1 months ago
Lenient Array Operations for Practical Secure Information Flow
Our goal in this paper is to make secure information flow typing more practical. We propose simple and permissive typing rules for array operations in a simple sequential imperati...
Zhenyue Deng, Geoffrey Smith
DBSEC
2001
129views Database» more  DBSEC 2001»
14 years 10 months ago
Secure Role-Based Workflow Models
: In this paper we introduce a series of reference models for Secure Role-Based Workflow systems. We build our models over the well-known RBAC96 framework. 96 model supports the no...
Savith Kandala, Ravi S. Sandhu
ICST
2009
IEEE
15 years 4 months ago
Transforming and Selecting Functional Test Cases for Security Policy Testing
In this paper, we consider typical applications in which the business logic is separated from the access control logic, implemented in an independent component, called the Policy ...
Tejeddine Mouelhi, Yves Le Traon, Benoit Baudry
ECEASST
2010
14 years 4 months ago
Security Evaluation and Hardening of Free and Open Source Software (FOSS)
Abstract: Recently, Free and Open Source Software (FOSS) has emerged as an alternative to Commercial-Off-The-Shelf (COTS) software. Now, FOSS is perceived as a viable long-term sol...
Robert Charpentier, Mourad Debbabi, Dima Alhadidi,...
79
Voted
WISA
2007
Springer
15 years 3 months ago
A Compositional Multiple Policies Operating System Security Model
Multilevel security policies aim at only confidentiality assurance, with less consideration on integrity assurance and weakness in expressing channel control policies. Besides, the...
Lei Xia, Wei Huang, Hao Huang