Sciweavers

3899 search results - page 57 / 780
» Argumentation for Access Control
Sort
View
C3S2E
2009
ACM
15 years 9 months ago
A verification framework for access control in dynamic web applications
This paper proposes a security analysis framework for dynamic web applications. A reverse engineering process is performed over a dynamic web application to extract a rolebased ac...
Manar H. Alalfi, James R. Cordy, Thomas R. Dean
128
Voted
ICWSM
2008
15 years 6 months ago
Social Access Control for Social Media Using Shared Knowledge Questions
Managing privacy of online content is difficult. We present a simple social access control where sharers specify test questions of shared knowledge, such as "what is our scho...
Michael Toomim, Xianhang Zhang, James Fogarty, Nat...
DBSEC
2004
91views Database» more  DBSEC 2004»
15 years 6 months ago
Implementing Real-Time Update of Access Control Policies
Real-time update of access control policies, that is, updating policies while they are in effect and enforcing the changes immediately, is necessary for many security-critical appl...
Indrakshi Ray, Tai Xin
ATVA
2010
Springer
163views Hardware» more  ATVA 2010»
15 years 5 months ago
Automatic Generation of History-Based Access Control from Information Flow Specification
This paper proposes a method for automatically inserting check statements for access control into a given recursive program according to a given security specification. A history-b...
Yoshiaki Takata, Hiroyuki Seki
JSAC
2006
147views more  JSAC 2006»
15 years 5 months ago
Smart pay access control via incentive alignment
We use game theorectic models to show the lack of incentives in the TCP congestion avoidance algorithm and the consequential systemwide network problems. We then propose a Vickery-...
Jun Shu, Pravin Varaiya