Sciweavers

370 search results - page 33 / 74
» Enforcing Access Control Using Risk Assessment
Sort
View
128
Voted
SP
2007
IEEE
183views Security Privacy» more  SP 2007»
15 years 8 months ago
Ciphertext-Policy Attribute-Based Encryption
In several distributed systems a user should only be able to access data if a user posses a certain set of credentials or attributes. Currently, the only method for enforcing such...
John Bethencourt, Amit Sahai, Brent Waters
ESORICS
2007
Springer
15 years 8 months ago
Maintaining High Performance Communication Under Least Privilege Using Dynamic Perimeter Control
Abstract. From a security standpoint, it is preferable to implement least privilege network security policies in which only the bare minimum of TCP/UDP ports on internal hosts are ...
Paul Z. Kolano
CCS
2008
ACM
15 years 3 months ago
Flexible security configuration for virtual machines
Virtual machines are widely accepted as a promising basis for building secure systems. However, while virtual machines offer effective mechanisms to create isolated environments, ...
Sandra Rueda, Yogesh Sreenivasan, Trent Jaeger
CAD
2007
Springer
15 years 1 months ago
A new digital human environment and assessment of vehicle interior design
Vehicle interior design directly relates to driver performance measures such as comfort, efficiency, risk of injury, and vehicle safety. A digital human is a convenient tool for ...
Jingzhou Yang, Joo H. Kim, Karim Abdel-Malek, Timo...
CCS
2007
ACM
15 years 8 months ago
Automaton segmentation: a new approach to preserve privacy in xml information brokering
A Distributed Information Brokering System (DIBS) is a peer-to-peer overlay network that comprises diverse data servers and brokering components helping client queries locate the ...
Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hs...