Sciweavers

2655 search results - page 108 / 531
» Event Systems and Access Control
Sort
View
141
Voted
HPDC
2002
IEEE
15 years 10 months ago
A Secure Distributed Search System
This paper presents the design, implementationand evaluation of Mingle, a secure distributed search system. Each participatinghost runs a Mingle server, which maintains an inverte...
Yinglian Xie, David R. O'Hallaron, Michael K. Reit...
CCS
2007
ACM
15 years 11 months ago
Incremental adaptation of XPath access control views
Materialized XPath access-control views are commonly used for enforcing access control. When access control rules defining a materialized XML access-control view change, the view...
Padmapriya Ayyagari, Prasenjit Mitra, Dongwon Lee,...
CCS
2009
ACM
16 years 5 months ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong
ISSTA
2006
ACM
15 years 11 months ago
Role-Based access control consistency validation
Modern enterprise systems support Role-Based Access Control (RBAC). Although RBAC allows restricting access to privileged operations, a deployer may actually intend to restrict ac...
Paolina Centonze, Gleb Naumovich, Stephen J. Fink,...
ACSAC
2007
IEEE
15 years 11 months ago
Retrofitting the IBM POWER Hypervisor to Support Mandatory Access Control
Server virtualization more readily enables the collocation of disparate workloads on a shared physical platform. When employed on systems across a data center, the result can be a...
Enriquillo Valdez, Reiner Sailer, Ronald Perez