Sciweavers

124 search results - page 14 / 25
» Synthesising verified access control systems in XACML
Sort
View
ICC
2007
IEEE
15 years 4 months ago
Performance Analysis of a Distributed Wireless Access Scheme
— Distributed channel access is essential for a wireless network without a central controller. In our previous research, we have proposed a distributed channel access scheme to a...
Hai Jiang, Ping Wang, Weihua Zhuang
CCS
2004
ACM
15 years 3 months ago
Attestation-based policy enforcement for remote access
Intranet access has become an essential function for corporate users. At the same time, corporation’s security administrators have little ability to control access to corporate ...
Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leende...
EMSOFT
2007
Springer
15 years 1 months ago
Verification of device drivers and intelligent controllers: a case study
The soundness of device drivers generally cannot be verified in isolation, but has to take into account the reactions of the hardware devices. In critical embedded systems, interf...
David Monniaux
DBSEC
2006
115views Database» more  DBSEC 2006»
14 years 11 months ago
Creating Objects in the Flexible Authorization Framework
Access control is a crucial concern to build secure IT systems and, more specifically, to protect the confidentiality of information. However, access control is necessary, but not ...
Nicola Zannone, Sushil Jajodia, Duminda Wijesekera
ICFP
2008
ACM
15 years 10 months ago
AURA: a programming language for authorization and audit
This paper presents AURA, a programming language for access control that treats ordinary programming constructs (e.g., integers and recursive functions) and authorization logic co...
Limin Jia, Jeffrey A. Vaughan, Karl Mazurak, Jianz...