Sciweavers

599 search results - page 76 / 120
» Managing Privacy in LBAC Systems
Sort
View
IESA
2007
15 years 3 months ago
A Security Framework for Smart Ubiquitous Industrial Resources
Conventional approaches to manage and control security seem to have reached their limits in new complex environments. These environments are open, dynamic, heterogeneous, distribut...
Anton Naumenko, Artem Katasonov, Vagan Y. Terziyan
CCS
2009
ACM
16 years 2 months ago
D-algebra for composing access control policy decisions
This paper proposes a D-algebra to compose decisions from multiple access control policies. Compared to other algebrabased approaches aimed at policy composition, D-algebra is the...
Qun Ni, Elisa Bertino, Jorge Lobo
CCS
2009
ACM
15 years 8 months ago
A probabilistic approach to hybrid role mining
Role mining algorithms address an important access control problem: configuring a role-based access control system. Given a direct assignment of users to permissions, role mining...
Mario Frank, Andreas P. Streich, David A. Basin, J...
CCS
2009
ACM
15 years 8 months ago
XCS: cross channel scripting and its impact on web applications
We study the security of embedded web servers used in consumer electronic devices, such as security cameras and photo frames, and for IT infrastructure, such as wireless access po...
Hristo Bojinov, Elie Bursztein, Dan Boneh
IEEEARES
2007
IEEE
15 years 7 months ago
Aggregating and Deploying Network Access Control Policies
The existence of errors or inconsistencies in the configuration of security components, such as filtering routers and/or firewalls, may lead to weak access control policies — ...
Joaquín García-Alfaro, Fréd&e...