Sciweavers

860 search results - page 99 / 172
» On the Security of Delegation in Access Control Systems
Sort
View
113
Voted
CORR
2008
Springer
143views Education» more  CORR 2008»
15 years 2 months ago
A Type System for Data-Flow Integrity on Windows Vista
The Windows Vista operating system implements an interesting model of multi-level integrity. We observe that in this model, trusted code must participate in any information-flow a...
Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani
120
Voted
DBSEC
2004
170views Database» more  DBSEC 2004»
15 years 3 months ago
RBAC/MAC Security Analysis and Design for UML
In software construction, analysis investigates the boundary of a system (scope and requirements), its usage and access, and from a security perspective, who needs access to what ...
Thuong Doan, Steven A. Demurjian, Charles E. Phill...
139
Voted
SACMAT
2010
ACM
15 years 6 months ago
Monitoring security policies with metric first-order temporal logic
We show the practical feasibility of monitoring complex security properties using a runtime monitoring approach for metric first-order temporal logic. In particular, we show how ...
David A. Basin, Felix Klaedtke, Samuel Müller
WWW
2007
ACM
16 years 2 months ago
Subspace: secure cross-domain communication for web mashups
Combining data and code from third-party sources has enabled a new wave of web mashups that add creativity and functionality to web applications. However, browsers are poorly desi...
Collin Jackson, Helen J. Wang
86
Voted
CCS
2009
ACM
15 years 8 months ago
Physically restricted authentication with trusted hardware
Modern computer systems permit users to access protected information from remote locations. In certain secure environments, it would be desirable to restrict this access to a part...
Michael S. Kirkpatrick, Elisa Bertino