Sciweavers

68 search results - page 4 / 14
» Trust-Based Access Control for Privacy Protection in Collabo...
Sort
View
SP
2000
IEEE
110views Security Privacy» more  SP 2000»
13 years 10 months ago
LOMAC: Low Water-Mark Integrity Protection for COTS Environments
We hypothesize that a form of kernel-resident accesscontrol-based integrity protection can gain widespread acceptance in Commercial Off-The-Shelf (COTS) environments provided that...
Timothy Fraser
WOWMOM
2006
ACM
191views Multimedia» more  WOWMOM 2006»
14 years 7 days ago
Privacy Preserving Trust Authorization Framework Using XACML
: Nowadays many organisations share sensitive services through open network systems and this raises the need for an authorization framework that can interoperate even when the part...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...
ICDCIT
2004
Springer
13 years 11 months ago
Vulnerabilities and Threats in Distributed Systems
We discuss research issues and models for vulnerabilities and threats in distributed computing systems. We present four diverse approaches to reducing system vulnerabilities and th...
Bharat K. Bhargava, Leszek Lilien
ESORICS
2011
Springer
12 years 6 months ago
Protecting Private Web Content from Embedded Scripts
Many web pages display personal information provided by users. The goal of this work is to protect that content from untrusted scripts that are embedded in host pages. We present a...
Yuchen Zhou, David Evans
ICDS
2009
IEEE
14 years 1 months ago
Self Protecting Data for De-perimeterised Information Sharing
- The emergence of high-speed networks, Grid Computing, Service-Oriented Architectures, and an ever increasing ambient connection to mobile Internet has enabled an underpinning inf...
Pete Burnap, Jeremy Hilton