Sciweavers

238 search results - page 12 / 48
» Security Control for COTS Components
Sort
View
83
Voted
ARESEC
2011
145views more  ARESEC 2011»
13 years 9 months ago
An Attribute Based Framework for Risk-Adaptive Access Control Models
—The concept of risk-based adaptive access control (RAdAC, pronounced Raid-ack) has been recently introduced in the literature. It seeks to automatically (or semi-automatically) ...
Savith Kandala, Ravi S. Sandhu, Venkata Bhamidipat...
WORDS
2002
IEEE
15 years 2 months ago
Role-Based Access Control for CORBA Distributed Object Systems
This paper shows how role-based access control (RBAC) models can be implemented in distributed object-based systems that follow OMG/CORBA standards. We introduce a novel approach ...
Rafael R. Obelheiro, Joni da Silva Fraga
HIPEAC
2005
Springer
15 years 3 months ago
Memory-Centric Security Architecture
Abstract. This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for ...
Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee
DSONLINE
2006
79views more  DSONLINE 2006»
14 years 9 months ago
Integrating Security Policies via Container Portable Interceptors
In the past, it was very common to develop middleware without consideration of security from the very beginning. To integrate security, the middleware that should be protected has...
Tom Ritter, Rudolf Schreiner, Ulrich Lang
IFIPTM
2010
204views Management» more  IFIPTM 2010»
14 years 8 months ago
xESB: An Enterprise Service Bus for Access and Usage Control Policy Enforcement
Enforcing complex policies that span organizational domains is an open challenge. Current work on SOA policy enforcement splits security in logical components that can be distribut...
Gabriela Gheorghe, Stephan Neuhaus, Bruno Crispo