Sciweavers

860 search results - page 81 / 172
» On the Security of Delegation in Access Control Systems
Sort
View
HPDC
1999
IEEE
15 years 6 months ago
The UNICORE Architecture Seamless Access to Distributed Resources
Seamless access to different systems of different vendors at different sites is an important prerequisite to effective and efficient use of distributed resources. Learning about n...
Mathilde Romberg
125
Voted
LADC
2007
Springer
15 years 8 months ago
Security Patterns and Secure Systems Design
Analysis and design patterns are well established as a convenient and reusable way to build high-quality object-oriented software. Patterns combine experience and good practices t...
Eduardo B. Fernández
122
Voted
ECMDAFA
2008
Springer
97views Hardware» more  ECMDAFA 2008»
15 years 3 months ago
Model-Driven Security in Practice: An Industrial Experience
Abstract. In this paper we report on our experience on using the socalled model-driven security approach in an MDA industrial project. In model-driven security, "designers spe...
Manuel Clavel, Viviane da Silva, Christiano Braga,...
116
Voted
USENIX
2007
15 years 4 months ago
From Trusted to Secure: Building and Executing Applications That Enforce System Security
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be used to ensure system-wide data confidentiality and integrity. These protections...
Boniface Hicks, Sandra Rueda, Trent Jaeger, Patric...
ISI
2006
Springer
15 years 1 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu