Sciweavers

151 search results - page 1 / 31
» On Testing for Absence of Rights in Access Control Models
Sort
View
48
Voted
CSFW
1993
IEEE
15 years 3 months ago
On Testing for Absence of Rights in Access Control Models
Ravi S. Sandhu, Srinivas Ganta
DRM
2003
Springer
15 years 4 months ago
Experiences with the enforcement of access rights extracted from ODRL-based digital contracts
In this paper, we present our experiences concerning the enforcement of access rights extracted from ODRL-based digital contracts. We introduce the generalized Contract Schema (Co...
Susanne Guth, Gustaf Neumann, Mark Strembeck
89
Voted
SOCO
2008
Springer
14 years 10 months ago
Component-Based Access Control: Secure Software Composition through Static Analysis
Abstract. Extensible Component Platforms support the discovery, installation, starting, uninstallation of components at runtime. Since they are often targeted at mobile resource-co...
Pierre Parrend, Stéphane Frénot
67
Voted
INAP
2001
Springer
15 years 3 months ago
Content-based Management of Document Access Control
Three different security models have been advocated to determine the access rights to documents in a network of computers; DAC, MLS, and RBAC. Each of these models has its strengt...
Edgar Weippl, Ismail Khalil Ibrahim, Werner Winiwa...
126
Voted
NDSS
2003
IEEE
15 years 4 months ago
Access Control Based on Execution History
Security is a major, frequent concern in extensible software systems such as Java Virtual Machines and the Common Language Runtime. These systems aim to enable simple, classic app...
Martín Abadi, Cédric Fournet