Sciweavers

926 search results - page 141 / 186
» Policy framings for access control
Sort
View
92
Voted
CCS
2010
ACM
15 years 5 months ago
A logic for authorization provenance
In distributed environments, statements from a number of principals, besides the central trusted party, may influence the derivations of authorization decisions. However, existin...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
69
Voted
NDSS
2009
IEEE
15 years 4 months ago
Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems
Host compromise is a serious computer security problem today. To better protect hosts, several Mandatory Access Control systems, such as Security Enhanced Linux (SELinux) and AppA...
Hong Chen, Ninghui Li, Ziqing Mao
ICMCS
2007
IEEE
228views Multimedia» more  ICMCS 2007»
15 years 4 months ago
Dynamic Privacy in a Smart House Environment
— A smart house can be regarded as a surveillance environment in which the person being observed carries out activities that range from intimate to more public. What can be obser...
Simon Moncrieff, Svetha Venkatesh, Geoff A. W. Wes...
SP
2006
IEEE
110views Security Privacy» more  SP 2006»
15 years 4 months ago
Privacy and Contextual Integrity: Framework and Applications
Contextual integrity is a conceptual framework for understanding privacy expectations and their implications developed in the literature on law, public policy, and political philo...
Adam Barth, Anupam Datta, John C. Mitchell, Helen ...
SWS
2004
ACM
15 years 3 months ago
Trust but verify: authorization for web services
Through web service technology, distributed applications can be built in a exible manner, bringing tremendous power to applications on the web. However, this exibility poses sig...
Christian Skalka, Xiaoyang Sean Wang