Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMarch 2018
Access Control Model for Virtual Objects (Shadows) Communication for AWS Internet of Things
CODASPY '18: Proceedings of the Eighth ACM Conference on Data and Application Security and PrivacyPages 175–185https://doi.org/10.1145/3176258.3176328The concept of Internet of Things (IoT) has received considerable attention and development in recent years. There have been significant studies on access control models for IoT in academia, while companies have already deployed several cloud-enabled ...
- research-articleMarch 2015
Content Level Access Control for OpenStack Swift Storage
CODASPY '15: Proceedings of the 5th ACM Conference on Data and Application Security and PrivacyPages 123–126https://doi.org/10.1145/2699026.2699124Swift, the object storage service from OpenStack cloud computing platform is used for storing, managing and retrieving large amounts of data. Inside Swift, uploaded files, also known as objects, are organized in containers. Objects inside a container ...
- ArticleApril 2010
A Quadratic, Complete, and Minimal Consistency Diagnosis Process for Firewall ACLs
AINA '10: Proceedings of the 2010 24th IEEE International Conference on Advanced Information Networking and ApplicationsPages 1037–1046https://doi.org/10.1109/AINA.2010.63Developing and managing firewall Access Control Lists (ACLs) are hard, time-consuming, and error-prone tasks for a variety of reasons. Complexity of networks is constantly increasing, as it is the size of firewall ACLs. Networks have different access ...
- ArticleJuly 2009
MDA-Based Framework for Automatic Generation of Consistent Firewall ACLs with NAT
ICCSA '09: Proceedings of the International Conference on Computational Science and Its Applications: Part IIPages 130–144https://doi.org/10.1007/978-3-642-02457-3_11The design and management of firewall ACLs is a very hard and error-prone task. Part of this complexity comes from the fact that each firewall platform has its own low-level language with a different functionality, syntax, and development environment. ...
- ArticleJune 2009
AFPL2, an Abstract Language for Firewall ACLs with NAT Support
DEPEND '09: Proceedings of the 2009 Second International Conference on DependabilityPages 52–59https://doi.org/10.1109/DEPEND.2009.14The design and management of firewall ACLs is a very hard and error-prone task. Part of this complexity comes from the fact that each firewall platform has its own low-level language with a different functionality, syntax, and development environment. ...
- rfcDecember 2008
RFC 5397: WebDAV Current Principal Extension
This specification defines a new WebDAV property that allows clients to quickly determine the principal corresponding to the current authenticated user. [STANDARDS-TRACK]
- ArticleJune 2008
AFPL, an Abstract Language Model for Firewall ACLs
ICCSA '08: Proceedings of the international conference on Computational Science and Its Applications, Part IIPages 468–483https://doi.org/10.1007/978-3-540-69848-7_39Design and management of firewall rule sets is difficult and error prone, mainly because the translation of access control requirements to low level languages is difficult. Abstract languages have been proposed, but none have been adopted by the ...
- ArticleMarch 2008
Fast Algorithms for Consistency-Based Diagnosis of Firewall Rule Sets
ARES '08: Proceedings of the 2008 Third International Conference on Availability, Reliability and SecurityPages 229–236https://doi.org/10.1109/ARES.2008.42Firewalls provide the first line of defence of nearly all networked institutions today. However, Firewall ACL management suffer some problems that need to be addressed in order to be effective. The most studied one is rule set consistency. There is an ...
- rfcDecember 2006
RFC 4768: Desired Enhancements to Generic Security Services Application Program Interface (GSS-API) Version 3 Naming
The Generic Security Services API (GSS-API) provides a naming architecture that supports name-based authorization. GSS-API authenticates two named parties to each other. Names can be stored on access control lists (ACLs) to make authorization decisions. ...
- ArticleAugust 2006
Review of security models applied to distributed data access
In this paper, we explore the technologies behind the security models applied to distributed data access in a Grid environment. Our goal is to study a security model allowing data integrity, confidentiality, authentication and authorization for VO ...