Sciweavers

67 search results - page 3 / 14
» Auditing for Accessibility
Sort
View
CSFW
2008
IEEE
14 years 27 days ago
Evidence-Based Audit
Authorization logics provide a principled and flexible approach to specifying access control policies. One of their compelling benefits is that a proof in the logic is evidence ...
Jeffrey A. Vaughan, Limin Jia, Karl Mazurak, Steve...
ICDE
2008
IEEE
132views Database» more  ICDE 2008»
14 years 7 months ago
Auditing SQL Queries
We study the problem of auditing a batch of SQL queries: Given a forbidden view of a database that should have been kept confidential, a batch of queries that were posed over this ...
Rajeev Motwani, Shubha U. Nabar, Dilys Thomas
USENIX
1994
13 years 7 months ago
A Toolkit and Methods for Internet Firewalls
The purpose of an Internet firewall is to provide a point of defense and a controlled and audited access to services, both from within and without an organization
Marcus J. Ranum, Frederick M. Avolio
USS
2008
13 years 8 months ago
Pre-Election Testing and Post-Election Audit of Optical Scan Voting Terminal Memory Cards
Optical scan electronic voting machines employ software components that are customized for each specific election. Such software components are critical from a security and integr...
Seda Davtyan, Sotiris Kentros, Aggelos Kiayias, La...
EDBT
2009
ACM
145views Database» more  EDBT 2009»
13 years 10 months ago
An efficient online auditing approach to limit private data disclosure
In a database system, disclosure of confidential private data may occur if users can put together the answers of past queries. Traditional access control mechanisms cannot guard a...
Haibing Lu, Yingjiu Li, Vijayalakshmi Atluri, Jaid...