Sciweavers

692 search results - page 17 / 139
» Shamon: A System for Distributed Mandatory Access Control
Sort
View
KES
2008
Springer
14 years 9 months ago
A Secure Mediator for Integrating Multiple Level Access Control Policies
Abstract. We present a method for mapping security levels among the components of a distributed system where data in the local sources are represented in XML. Distributed data is i...
Isabel F. Cruz, Rigel Gjomemo, Mirko Orsini
TACS
2001
Springer
15 years 1 months ago
A Typed Process Calculus for Fine-Grained Resource Access Control in Distributed Computation
We propose the πD -calculus, a process calculus that can flexibly model fine-grained control of resource access in distributed computation, with a type system that statically pr...
Daisuke Hoshina, Eijiro Sumii, Akinori Yonezawa
SACMAT
2009
ACM
15 years 4 months ago
Analysis of virtual machine system policies
The recent emergence of mandatory access (MAC) enforcement for virtual machine monitors (VMMs) presents an opportunity to enforce a security goal over all its virtual machines (VM...
Sandra Rueda, Hayawardh Vijayakumar, Trent Jaeger
CN
2006
124views more  CN 2006»
14 years 9 months ago
Session based access control in geographically replicated Internet services
Performance critical services over Internet often rely on geographically distributed architectures of replicated servers. Content Delivery Networks (CDN) are a typical example whe...
Novella Bartolini
WETICE
2003
IEEE
15 years 2 months ago
Policy Storage for Role-Based Access Control Systems
Role-based access control has been a focal area for many security researchers over the last decade. There have been a large number of models, and many rich specification language...
András Belokosztolszki, David M. Eyers, Wei...