Sciweavers

2335 search results - page 54 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
166
Voted
CCS
2008
ACM
15 years 6 months ago
Assessing query privileges via safe and efficient permission composition
We propose an approach for the selective enforcement of access control restrictions in, possibly distributed, large data collections based on two basic concepts: i) flexible autho...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
SP
2010
IEEE
174views Security Privacy» more  SP 2010»
15 years 8 months ago
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity
— Virtualization is being widely adopted in today’s computing systems. Its unique security advantages in isolating and introspecting commodity OSes as virtual machines (VMs) ha...
Zhi Wang, Xuxian Jiang
CCS
2004
ACM
15 years 10 months ago
KNOW Why your access was denied: regulating feedback for usable security
We examine the problem of providing useful feedback about access control decisions to users while controlling the disclosure of the system’s security policies. Relevant feedback...
Apu Kapadia, Geetanjali Sampemane, Roy H. Campbell
CASES
2008
ACM
15 years 6 months ago
Active control and digital rights management of integrated circuit IP cores
We introduce the first approach that can actively control multiple hardware intellectual property (IP) cores used in an integrated circuit (IC). The IP rights owner(s) can remotel...
Yousra Alkabani, Farinaz Koushanfar
SAM
2000
102views Hardware» more  SAM 2000»
15 years 6 months ago
Test Generation Based On Control And Data Dependencies Within Multi-Process SDL Specifications
Control and data flow aspects of a distributed system can be identified through the analysis of control and data dependencies that exist not only within processes, but also across...
Olaf Henniger, Hasan Ural