Sciweavers

860 search results - page 69 / 172
» On the Security of Delegation in Access Control Systems
Sort
View
124
Voted
IJISEC
2007
149views more  IJISEC 2007»
15 years 1 months ago
Dynamic security labels and static information flow control
This paper presents a language in which information flow is securely controlled by a type system, yet the security class of data can vary dynamically. Information flow policies ...
Lantian Zheng, Andrew C. Myers
109
Voted
IMC
2005
ACM
15 years 7 months ago
Perils of Transitive Trust in the Domain Name System
The Domain Name System, DNS, is based on nameserver delegations, which introduce complex and subtle dependencies between names and nameservers. In this paper, we present results f...
Venugopalan Ramasubramanian, Emin Gün Sirer
126
Voted
SP
2007
IEEE
183views Security Privacy» more  SP 2007»
15 years 8 months ago
Ciphertext-Policy Attribute-Based Encryption
In several distributed systems a user should only be able to access data if a user posses a certain set of credentials or attributes. Currently, the only method for enforcing such...
John Bethencourt, Amit Sahai, Brent Waters
CONCUR
2001
Springer
15 years 6 months ago
Reasoning about Security in Mobile Ambients
The paper gives an assessment of security for Mobile Ambients, with specific focus on mandatory access control (MAC) policies in multilevel security systems. The first part of th...
Michele Bugliesi, Giuseppe Castagna, Silvia Crafa
114
Voted
IFIP
2005
Springer
15 years 7 months ago
Type-Based Distributed Access Control vs. Untyped Attackers
This paper considers the effect of untyped attackers inside a distributed system where security is enforced by the type system. In previous work we introduced the Key-Based Decentr...
Tom Chothia, Dominic Duggan