Sciweavers

2335 search results - page 52 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
COORDINATION
2008
Springer
15 years 6 months ago
From Flow Logic to Static Type Systems for Coordination Languages
Abstract. Coordination languages are often used to describe open ended systems. This makes it challenging to develop tools for guaranteeing security of the coordinated systems and ...
Rocco De Nicola, Daniele Gorla, René Rydhof...
SACMAT
2003
ACM
15 years 9 months ago
Dependencies and separation of duty constraints in GTRBAC
A Generalized Temporal Role Based Access Control (GTRBAC) model that captures an exhaustive set of temporal constraint needs for access control has recently been proposed. GTRBACâ...
James Joshi, Basit Shafiq, Arif Ghafoor, Elisa Ber...
CCS
2004
ACM
15 years 10 months ago
Security policies for downgrading
A long-standing problem in information security is how to specify and enforce expressive security policies that control information flow while also permitting information release...
Stephen Chong, Andrew C. Myers
141
Voted
USS
2010
15 years 2 months ago
Baaz: A System for Detecting Access Control Misconfigurations
Maintaining correct access control to shared resources such as file servers, wikis, and databases is an important part of enterprise network management. A combination of many fact...
Tathagata Das, Ranjita Bhagwan, Prasad Naldurg
163
Voted
ICDS
2009
IEEE
15 years 11 months ago
Self Protecting Data for De-perimeterised Information Sharing
- The emergence of high-speed networks, Grid Computing, Service-Oriented Architectures, and an ever increasing ambient connection to mobile Internet has enabled an underpinning inf...
Pete Burnap, Jeremy Hilton