Search
for Topics
All Reviews
Browse All Reviews
>
Software (D)
>
Operating Systems (D.4)
>
Security and Protection (D.4.6)
> Access Controls (D.4.6...)
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
1-10 of 65 Reviews about "
Access Controls (D.4.6...)
":
Date Reviewed
Attribute-based access control
Hu V., Ferraiolo D., Chandramouli R., Kuhn D., Artech House, Inc., Norwood, MA, 2017. 280 pp. Type: Book (978-1-630811-34-1), Reviews: (2 of 2)
In many applications, it becomes a necessity to define who (which user) is allowed to access what (which resource). This is achieved via access control. Several models for access control exist. Attribute-based access control (ABAC) is ...
Sep 5 2018
Attribute-based access control
Hu V., Ferraiolo D., Chandramouli R., Kuhn D., Artech House, Inc., Norwood, MA, 2017. 280 pp. Type: Book (978-1-630811-34-1), Reviews: (1 of 2)
Due to the increasing distribution and complexity of current applications, attribute-based access control (ABAC) is slowly becoming the only way to control access. This monograph summarizes the accumulated knowledge on this important s...
Jul 20 2018
A formal proximity model for RBAC systems
Gupta A., Kirkpatrick M., Bertino E. Computers and Security 4152-67, 2014. Type: Article
Gupta et al. claim that role-based access control (RBAC) for the mobile and ubiquitous computing environment needs further constraints, such as a relative distance (proximity) of two roles, in allowing access to resources. For instance...
Aug 22 2014
Security model based encryption to protect data on cloud
Ghebghoub Y., Boussaid O., Oukid S. ISDOC 2014 (Proceedings of the International Conference on Information Systems and Design of Communication, Lisbon, Portugal, May 16-17, 2014) 50-55, 2014. Type: Proceedings
In general, encryption is applied to clouds in rather unimaginative ways, mostly to protect storage or communications, as with other distributed systems. When I saw “model-based encryption” in the title, I expected ...
Aug 8 2014
FireDroid: hardening security in almost-stock Android
Russello G., Jimenez A., Naderi H., van der Mark W. ACSAC 2013 (Proceedings of the 29th Annual Computer Security Applications Conference, New Orleans, LA, Dec 9-13, 2013) 319-328, 2013. Type: Proceedings
This paper proposes a policy-based framework to enforce security policies by intercepting system calls to the Linux kernel beneath the Android operating system (OS). By using this approach it is possible to detect security breaches by ...
May 22 2014
A system for timely and controlled information sharing in emergency situations
Carminati B., Ferrari E., Guglielmi M. IEEE Transactions on Dependable and Secure Computing 10(3): 129-142, 2013. Type: Article
An access control system should support the ability to make changes in response to emergencies. The authors of this paper propose a model for making such changes during medical emergencies, which are actually business as usual in a hos...
Sep 12 2013
PSiOS: bring your own privacy & security to iOS devices
Werthmann T., Hund R., Davi L., Sadeghi A., Holz T. ASIA CCS 2013 (Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, Hangzhou, China, May 8-10, 2013) 13-24, 2013. Type: Proceedings
PSiOS, short for privacy and security for iOS devices, is a “novel policy enforcement framework for iOS” that is timely and resonates with my concerns about the security of iOS devices such as the iPhone and iPad. S...
Jul 25 2013
Digital forensics for enterprise rights management systems
Schrittwieser S., Kieseberg P., Weippl E. IIWAS 2012 (Proceedings of the 14th International Conference on Information Integration and Web-based Applications & Services, Bali, Indonesia, Dec 3-5, 2012) 111-120, 2012. Type: Proceedings
Enterprise rights management (ERM) is concerned with managing and protecting data in an enterprise context. Digital forensics issues run into considerations of encryption and access protection. Existing guidelines and standards, such a...
May 16 2013
Aspectizing Java access control
Toledo R., Nunez A., Tanter E., Noye J. IEEE Transactions on Software Engineering 38(1): 101-117, 2012. Type: Article
Although aspect-oriented programming is highly recommended for security, there are few pragmatic examples that demonstrate the expressiveness offered by this paradigm. Most papers present aspect-oriented programming examples using pseu...
Jan 7 2013
Provably-secure time-bound hierarchical key assignment schemes
Ateniese G., De Santis A., Ferrara A., Masucci B. Journal of Cryptology 25(2): 243-270, 2012. Type: Article
A hierarchical key assignment scheme is an algorithm for assigning cryptographic keys to users. Consider a set of users that needs to communicate securely. Using the assigned secret key and public information, a user should be able to ...
Oct 1 2012
Display
5
10
15
25
50
100
per page
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy