Sciweavers

2335 search results - page 123 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
154
Voted
POLICY
2005
Springer
15 years 10 months ago
A RBAC-Based Policy Information Base
This paper presents a framework for representing and distributing access control policies in distributed heterogeneous systems. Access control polices follows the RBAC (Role Based...
Timothy E. Squair, Edgard Jamhour, Ricardo Nabhen
CCS
2006
ACM
15 years 8 months ago
On the modeling and analysis of obligations
Traditional security policies largely focus on access control requirements, which specify who can access what under what circumstances. Besides access control requirements, the av...
Keith Irwin, Ting Yu, William H. Winsborough
CN
2008
128views more  CN 2008»
15 years 5 months ago
Autonomous security for autonomous systems
The Internet's interdomain routing protocol, BGP, supports a complex network of Autonomous Systems which is vulnerable to a number of potentially crippling attacks. Several p...
Josh Karlin, Stephanie Forrest, Jennifer Rexford
IFIP
2007
Springer
15 years 11 months ago
Lessons Learned from the Maroochy Water Breach
Supervisory control and data acquisition (SCADA) systems are widely used to monitor and control operations in electrical power distribution facilities, oil and gas pipelines, water...
Jill Slay, Michael Miller
CDC
2009
IEEE
126views Control Systems» more  CDC 2009»
15 years 9 months ago
Overcoming limitations of game-theoretic distributed control
—Recently, game theory has been proposed as a tool for cooperative control. Specifically, the interactions of a multiagent distributed system are modeled as a non-cooperative ga...
Jason R. Marden, Adam Wierman