Sciweavers

370 search results - page 17 / 74
» Enforcing Access Control Using Risk Assessment
Sort
View
ESORICS
2006
Springer
15 years 5 months ago
Delegation in Role-Based Access Control
User delegation is a mechanism for assigning access rights available to a user to another user. A delegation operation can either be a grant or transfer operation. Delegation for r...
Jason Crampton, Hemanth Khambhammettu
COLCOM
2008
IEEE
15 years 8 months ago
Combining Social Networks and Semantic Web Technologies for Personalizing Web Access
Abstract. The original purpose of Web metadata was to protect endusers from possible harmful content and to simplify search and retrieval. However they can also be exploited in mor...
Barbara Carminati, Elena Ferrari, Andrea Perego
ESOP
2010
Springer
15 years 11 months ago
Enforcing Stateful Authorization and Information Flow Policies in Fine
Proving software free of security bugs is hard. Languages that ensure that programs correctly enforce their security policies would help, but, to date, no security-typed language h...
Nikhil Swamy, Juan Chen and Ravi Chugh
121
Voted
DIMVA
2009
15 years 3 months ago
A Service Dependency Modeling Framework for Policy-Based Response Enforcement
The use of dynamic access control policies for threat response adapts local response decisions to high level system constraints. However, security policies are often carefully tigh...
Nizar Kheir, Hervé Debar, Fréd&eacut...
HASE
2008
IEEE
15 years 8 months ago
Formal Support for Quantitative Analysis of Residual Risks in Safety-Critical Systems
With the increasing complexity in software and electronics in safety-critical systems new challenges to lower the costs and decrease time-to-market, while preserving high assuranc...
Jonas Elmqvist, Simin Nadjm-Tehrani