Sciweavers

1073 search results - page 143 / 215
» Secure context-sensitive authorization
Sort
View
RAID
2010
Springer
15 years 1 months ago
A Data-Centric Approach to Insider Attack Detection in Database Systems
The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...
TRUST
2010
Springer
15 years 1 months ago
Key Attestation from Trusted Execution Environments
Abstract. Credential platforms implemented on top of Trusted Execution Environments3 (TrEEs) allow users to store and use their credentials, e.g., cryptographic keys or user passwo...
Kari Kostiainen, Alexandra Dmitrienko, Jan-Erik Ek...
CHI
2011
ACM
14 years 6 months ago
Home automation in the wild: challenges and opportunities
Visions of smart homes have long caught the attention of researchers and considerable effort has been put toward enabling home automation. However, these technologies have not bee...
A. J. Bernheim Brush, Bongshin Lee, Ratul Mahajan,...
CCS
2009
ACM
16 years 3 months ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong
MINENET
2006
ACM
15 years 9 months ago
Forensic analysis of autonomous system reachability
Security incidents have an adverse impact not only on end systems, but also on Internet routing, resulting in many out-of-reach prefixes. Previous work has looked at performance ...
D. K. Lee, Sue B. Moon, Taesang Choi, Taesoo Jeong