Sciweavers

173 search results - page 19 / 35
» Evaluating Access Control Policies Through Model Checking
Sort
View
IEEECIT
2010
IEEE
14 years 10 months ago
Virtual Security Kernel: A Component-Based OS Architecture for Self-Protection
—This paper presents VSK, a lightweight adaptable OS authorization architecture suitable for self-protection of pervasive devices. A “virtual” management plane, separate from...
Ruan He, Marc Lacoste, Jean Leneutre
SACMAT
2009
ACM
15 years 6 months ago
Towards formal security analysis of GTRBAC using timed automata
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri
84
Voted
INFOCOM
2008
IEEE
15 years 6 months ago
Measurement and Modeling of the Origins of Starvation in Congestion Controlled Mesh Networks
—Significant progress has been made in understanding the behavior of TCP and congestion-controlled traffic over multihop wireless networks. Despite these advances, however, no ...
Jingpu Shi, Omer Gurewitz, Vincenzo Mancuso, Josep...
ACSAC
2002
IEEE
15 years 4 months ago
A Context-Aware Security Architecture for Emerging Applications
We describe an approach to building security services for context-aware environments. Specifically, we focus on the design of security services that incorporate the use of securi...
Michael J. Covington, Prahlad Fogla, Zhiyuan Zhan,...
SP
1989
IEEE
15 years 3 months ago
Security Issues in Policy Routing
Routing mechanisms for inter-autonomousregion communication require distribution of policy-sensitive information as well as algorithms that operate on such information. Without su...
Deborah Estrin, Gene Tsudik