Sciweavers

1462 search results - page 30 / 293
» Conditional Access in Mobile Systems: Securing the Applicati...
Sort
View
TGC
2005
Springer
15 years 5 months ago
Types for Security in a Mobile World
Our society is increasingly moving towards richer forms of information exchange where mobility of processes and devices plays a prominent role. This tendency has prompted the acade...
Adriana B. Compagnoni, Elsa L. Gunter
EUROSYS
2007
ACM
15 years 8 months ago
Authorizing applications in singularity
We describe a new design for authorization in operating systems in which applications are first-class entities. In this design, principals reflect application identities. Access c...
Ted Wobber, Aydan R. Yumerefendi, Martín Ab...
CCS
2007
ACM
15 years 6 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
CCS
2009
ACM
16 years 11 days ago
Semantic context aware security policy deployment
The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the secur...
Frédéric Cuppens, Joaquín Gar...
82
Voted
ACSC
2002
IEEE
15 years 4 months ago
Bracket Capabilities for Distributed Systems Security
The per-method access control lists of standard middleware technologies allow only simple forms of access control to be expressed and enforced. Research systems based on capabilit...
Mark Evered