All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)

EJ Schwartz, T Avgerinos… - 2010 IEEE symposium on …, 2010 - ieeexplore.ieee.org
Dynamic taint analysis and forward symbolic execution are quickly becoming staple
techniques in security analyses. Example applications of dynamic taint analysis and forward …

Capability-based delegation model in RBAC

K Hasebe, M Mabuchi, A Matsushita - … of the 15th ACM symposium on …, 2010 - dl.acm.org
For flexible and dynamic resource management in environments where users collaborate to
fulfill their common tasks, various attempts at modeling delegation of authority have been …

Enhancing security modeling for web services using delegation and pass-on

W She, IL Yen, B Thuraisingham - International Journal of Web …, 2010 - igi-global.com
In recent years, security issues in web service environments have been widely studied and
various security standards and models have been proposed. However, most of these …

A delegation model for extended RBAC

M Ben-Ghorbel-Talbi, F Cuppens… - International journal of …, 2010 - Springer
In the field of access control, delegation is an important aspect that is considered part of the
administration mechanism. Thus, a comprehensive access control model must provide a …

Dynamic authorisation policies for event-based task delegation

K Gaaloul, E Zahoor, F Charoy, C Godart - … June 7-9, 2010. Proceedings 22, 2010 - Springer
Task delegation presents one of the business process security leitmotifs. It defines a
mechanism that bridges the gap between both workflow and access control systems. There …

On a taxonomy of delegation

Q Pham, J Reid, A McCullagh, E Dawson - computers & security, 2010 - Elsevier
Delegation, from a technical point of view, is widely considered as a potential approach in
addressing the problem of providing dynamic access control decisions in activities with a …

Security in large-scale open distributed multi-agent systems

MA Oey, M Warnier, FMT Brazier - Autonomous Agents, 2010 - books.google.com
Designing large-scale distributed multi-agent systems that operate in open environments,
such as the Internet, creates new challenges, especially with respect to security issues …

域间授权互操作研究综述

王雅哲, 冯登国 - 计算机研究与发展, 2010 - cqvip.com
分布式系统安全是多域协作场景下的重要研究领域, 近年来得到大力发展. 在大多数实际的多域
协作过程中, 无论开发者还是管理者都不想完全摈弃已有的权限管理和访问控制体系 …

Static and dynamic delegation in the role graph model

H Wang, S Osborn - IEEE transactions on knowledge and data …, 2010 - ieeexplore.ieee.org
Delegation in access control is used to deal with exceptional circumstances, when a regular
user is unable to perform their normal job and delegates all or part of it to others. These …

基于UCON 和动态模糊神经网络的委托授权模型

周丽丽, 王凤英, 王洪福 - 山东理工大学学报: 自然科学版, 2010 - cqvip.com
分析了委托的基本特性, UCON 以及动态模糊神经网络, 提出了基于UCON
和动态模糊神经网络的委托授权模型, 并进行了可信度计算. 该模型引入委托机制 …