Sciweavers

692 search results - page 12 / 139
» Shamon: A System for Distributed Mandatory Access Control
Sort
View
87
Voted
TGC
2007
Springer
15 years 3 months ago
Access Control Based on Code Identity for Open Distributed Systems
In computing systems, trust is an expectation on the dynamic behavior of an agent; static analysis is a collection of techniques for establishing static bounds on the dynamic behav...
Andrew Cirillo, James Riely
TPDS
1998
94views more  TPDS 1998»
14 years 9 months ago
Access Control and Signatures via Quorum Secret Sharing
—We suggest a method of controlling the access to a secure database via quorum systems. A quorum system is a collection of sets (quorums) every two of which have a nonempty inter...
Moni Naor, Avishai Wool
ACSAC
1999
IEEE
15 years 1 months ago
A Distributed Certificate Management System (DCMS) Supporting Group-Based Access Controls
Mainly for scalability reasons, many cryptographic security protocols make use of public key cryptography and require the existence of a corresponding public key infrastructure (P...
Rolf Oppliger, Andreas Greulich, Peter Trachsel
SP
2005
IEEE
149views Security Privacy» more  SP 2005»
15 years 3 months ago
Distributed Proving in Access-Control Systems
We present a distributed algorithm for assembling a proof that a request satisfies an access-control policy expressed in a formal logic, in the tradition of Lampson et al. [16]. ...
Lujo Bauer, Scott Garriss, Michael K. Reiter