Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Software (D) > Operating Systems (D.4) > Security and Protection (D.4.6) > Access Controls (D.4.6...)  
 
Options:
 
  1-10 of 65 Reviews about "Access Controls (D.4.6...)": Date Reviewed
   Attribute-based access control
Hu V., Ferraiolo D., Chandramouli R., Kuhn D., Artech House, Inc., Norwood, MA, 2017. 280 pp.  Type: Book (978-1-630811-34-1), Reviews: (2 of 2)

In many applications, it becomes a necessity to define who (which user) is allowed to access what (which resource). This is achieved via access control. Several models for access control exist. Attribute-based access control (ABAC) is ...

Sep 5 2018
  Attribute-based access control
Hu V., Ferraiolo D., Chandramouli R., Kuhn D., Artech House, Inc., Norwood, MA, 2017. 280 pp.  Type: Book (978-1-630811-34-1), Reviews: (1 of 2)

Due to the increasing distribution and complexity of current applications, attribute-based access control (ABAC) is slowly becoming the only way to control access. This monograph summarizes the accumulated knowledge on this important s...

Jul 20 2018
  A formal proximity model for RBAC systems
Gupta A., Kirkpatrick M., Bertino E. Computers and Security 4152-67, 2014.  Type: Article

Gupta et al. claim that role-based access control (RBAC) for the mobile and ubiquitous computing environment needs further constraints, such as a relative distance (proximity) of two roles, in allowing access to resources. For instance...

Aug 22 2014
  Security model based encryption to protect data on cloud
Ghebghoub Y., Boussaid O., Oukid S.  ISDOC 2014 (Proceedings of the International Conference on Information Systems and Design of Communication, Lisbon, Portugal, May 16-17, 2014) 50-55, 2014.  Type: Proceedings

In general, encryption is applied to clouds in rather unimaginative ways, mostly to protect storage or communications, as with other distributed systems. When I saw “model-based encryption” in the title, I expected ...

Aug 8 2014
   FireDroid: hardening security in almost-stock Android
Russello G., Jimenez A., Naderi H., van der Mark W.  ACSAC 2013 (Proceedings of the 29th Annual Computer Security Applications Conference, New Orleans, LA, Dec 9-13, 2013) 319-328, 2013.  Type: Proceedings

This paper proposes a policy-based framework to enforce security policies by intercepting system calls to the Linux kernel beneath the Android operating system (OS). By using this approach it is possible to detect security breaches by ...

May 22 2014
  A system for timely and controlled information sharing in emergency situations
Carminati B., Ferrari E., Guglielmi M. IEEE Transactions on Dependable and Secure Computing 10(3): 129-142, 2013.  Type: Article

An access control system should support the ability to make changes in response to emergencies. The authors of this paper propose a model for making such changes during medical emergencies, which are actually business as usual in a hos...

Sep 12 2013
   PSiOS: bring your own privacy & security to iOS devices
Werthmann T., Hund R., Davi L., Sadeghi A., Holz T.  ASIA CCS 2013 (Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, Hangzhou, China, May 8-10, 2013) 13-24, 2013.  Type: Proceedings

PSiOS, short for privacy and security for iOS devices, is a “novel policy enforcement framework for iOS” that is timely and resonates with my concerns about the security of iOS devices such as the iPhone and iPad. S...

Jul 25 2013
  Digital forensics for enterprise rights management systems
Schrittwieser S., Kieseberg P., Weippl E.  IIWAS 2012 (Proceedings of the 14th International Conference on Information Integration and Web-based Applications & Services, Bali, Indonesia, Dec 3-5, 2012) 111-120, 2012.  Type: Proceedings

Enterprise rights management (ERM) is concerned with managing and protecting data in an enterprise context. Digital forensics issues run into considerations of encryption and access protection. Existing guidelines and standards, such a...

May 16 2013
  Aspectizing Java access control
Toledo R., Nunez A., Tanter E., Noye J. IEEE Transactions on Software Engineering 38(1): 101-117, 2012.  Type: Article

Although aspect-oriented programming is highly recommended for security, there are few pragmatic examples that demonstrate the expressiveness offered by this paradigm. Most papers present aspect-oriented programming examples using pseu...

Jan 7 2013
  Provably-secure time-bound hierarchical key assignment schemes
Ateniese G., De Santis A., Ferrara A., Masucci B. Journal of Cryptology 25(2): 243-270, 2012.  Type: Article

A hierarchical key assignment scheme is an algorithm for assigning cryptographic keys to users. Consider a set of users that needs to communicate securely. Using the assigned secret key and public information, a user should be able to ...

Oct 1 2012
 
 
 
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy