Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 13, Issue 3July 2010
Reflects downloads up to 01 Jan 2025Bibliometrics
Skip Table Of Content Section
editorial
Free
Editorial ESORICS 2007
Article No.: 19, Pages 1–2https://doi.org/10.1145/1805974.1805975
research-article
A logic for state-modifying authorization policies
Article No.: 20, Pages 1–28https://doi.org/10.1145/1805974.1805976

Administering and maintaining access control systems is a challenging task, especially in environments with complex and changing authorization requirements. A number of authorization logics have been proposed that aim at simplifying access control by ...

research-article
Security of multithreaded programs by compilation
Article No.: 21, Pages 1–32https://doi.org/10.1145/1805974.1805977

End-to-End security of mobile code requires that the code neither intentionally nor accidentally propagates sensitive information to an adversary. Although mobile code is commonly multithreaded low-level code, there lack enforcement mechanisms that ...

research-article
Combining fragmentation and encryption to protect privacy in data storage
Article No.: 22, Pages 1–33https://doi.org/10.1145/1805974.1805978

The impact of privacy requirements in the development of modern applications is increasing very quickly. Many commercial and legal regulations are driving the need to develop reliable solutions for protecting sensitive information whenever it is stored, ...

editorial
Free
Editorial SACMAT 2007
Article No.: 23, Pages 1–2https://doi.org/10.1145/1805974.1805979
research-article
Privacy-aware role-based access control
Article No.: 24, Pages 1–31https://doi.org/10.1145/1805974.1805980

In this article, we introduce a comprehensive framework supporting a privacy-aware access control mechanism, that is, a mechanism tailored to enforce access control to data containing personally identifiable information and, as such, privacy sensitive. ...

research-article
On the consistency of distributed proofs with hidden subtrees
Article No.: 25, Pages 1–32https://doi.org/10.1145/1805974.1805981

Previous work has shown that distributed authorization systems that fail to sample a consistent snapshot of the underlying system during policy evaluation are vulnerable to a number of attacks. Unfortuantely, the consistency enforcement solutions ...

research-article
A logical specification and analysis for SELinux MLS policy
Article No.: 26, Pages 1–31https://doi.org/10.1145/1805974.1805982

The SELinux mandatory access control (MAC) policy has recently added a multilevel security (MLS) model which is able to express a fine granularity of control over a subject's access rights. The problem is that the richness of the SELinux MLS model makes ...

research-article
The role mining problem: A formal perspective
Article No.: 27, Pages 1–31https://doi.org/10.1145/1805974.1805983

Devising a complete and correct set of roles has been recognized as one of the most important and challenging tasks in implementing role-based access control. A key problem related to this is the notion of goodness/interestingness—when is a role good/...

research-article
A framework to enforce access control over data streams
Article No.: 28, Pages 1–31https://doi.org/10.1145/1805974.1805984

Although access control is currently a key component of any computational system, it is only recently that mechanisms to guard against unauthorized access to streaming data have started to be investigated. To cope with this lack, in this article, we ...

Subjects

Comments