Sciweavers

354 search results - page 9 / 71
» A permission system for secure AOP
Sort
View
ACSAC
2009
IEEE
15 years 4 months ago
Semantically Rich Application-Centric Security in Android
—Smartphones are now ubiquitous. However, the security requirements of these relatively new systems and the applications they support are still being understood. As a result, the...
Machigar Ongtang, Stephen E. McLaughlin, William E...
DATE
2005
IEEE
154views Hardware» more  DATE 2005»
15 years 3 months ago
Secure Embedded Processing through Hardware-Assisted Run-Time Monitoring
— Security is emerging as an important concern in embedded system design. The security of embedded systems is often compromised due to vulnerabilities in “trusted” software t...
Divya Arora, Srivaths Ravi, Anand Raghunathan, Nir...
XMLSEC
2003
ACM
15 years 2 months ago
First experiences using XACML for access control in distributed systems
Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as com...
Markus Lorch, Seth Proctor, Rebekah Lepro, Dennis ...
EUROSYS
2007
ACM
15 years 6 months ago
Antiquity: exploiting a secure log for wide-area distributed storage
Antiquity is a wide-area distributed storage system designed to provide a simple storage service for applications like file systems and back-up. The design assumes that all serve...
Hakim Weatherspoon, Patrick R. Eaton, Byung-Gon Ch...
CSFW
2003
IEEE
15 years 2 months ago
Using Access Control for Secure Information Flow in a Java-like Language
Access control mechanisms are widely used with the intent of enforcing confidentiality and other policies, but few formal connections have been made between information flow and...
Anindya Banerjee, David A. Naumann