Sciweavers

370 search results - page 20 / 74
» Enforcing Access Control Using Risk Assessment
Sort
View
ESORICS
2006
Springer
15 years 5 months ago
A Formal Model of Access Control for Mobile Interactive Devices
Abstract. This paper presents an access control model for programming applications in which the access control to resources can employ user interaction to obtain the necessary perm...
Frédéric Besson, Guillaume Dufay, Th...
SACMAT
2011
ACM
14 years 4 months ago
Modeling data flow in socio-information networks: a risk estimation approach
Information leakage via the networks formed by subjects (e.g., Facebook, Twitter) and objects (e.g., blogosphere) − some of whom may be controlled by malicious insiders − ofte...
Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling...
ACISP
2003
Springer
15 years 7 months ago
A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems
Abstract. This paper examines the access control requirements of distributed health care information networks. Since the electronic sharing of an individual’s personal health inf...
Jason Reid, Ian Cheong, Matthew Henricksen, Jason ...
SACMAT
2004
ACM
15 years 7 months ago
Towards a credential-based implementation of compound access control policies
We describe a layered approach to access control for distributed and interoperable computing systems. Firstly, compound access control policies are conceptually specified, using ...
Joachim Biskup, Sandra Wortmann
146
Voted
EDCC
2008
Springer
15 years 3 months ago
Metrics for Object-Oriented Software Reliability Assessment - Application to a Flight Manager
In avionics domain, the software applications grew to millions of source lines of code representing important development expenditures. To cut the costs, the avionics suppliers ar...
Stéphanie Gaudan, Gilles Motet, Guillaume A...