Survey on access control for community-centered collaborative systems

F Paci, A Squicciarini, N Zannone - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
The last decades have seen a growing interest and demand for community-centered
collaborative systems and platforms. These systems and platforms aim to provide an …

A tutorial on physical security and side-channel attacks

F Koeune, FX Standaert - International School on Foundations of Security …, 2004 - Springer
A recent branch of cryptography focuses on the physical constraints that a real-life
cryptographic device must face, and attempts to exploit these constraints (running time …

All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)

EJ Schwartz, T Avgerinos… - 2010 IEEE symposium on …, 2010 - ieeexplore.ieee.org
Dynamic taint analysis and forward symbolic execution are quickly becoming staple
techniques in security analyses. Example applications of dynamic taint analysis and forward …

A unified attribute-based access control model covering DAC, MAC and RBAC

X Jin, R Krishnan, R Sandhu - Data and Applications Security and Privacy …, 2012 - Springer
Recently, there has been considerable interest in attribute based access control (ABAC) to
overcome the limitations of the dominant access control models (ie, discretionary-DAC …

Reputation-based framework for high integrity sensor networks

S Ganeriwal, LK Balzano, MB Srivastava - ACM Transactions on Sensor …, 2008 - dl.acm.org
Sensor network technology promises a vast increase in automatic data collection
capabilities through efficient deployment of tiny sensing devices. The technology will allow …

Design and implementation of the idemix anonymous credential system

J Camenisch, E Van Herreweghen - … of the 9th ACM Conference on …, 2002 - dl.acm.org
Anonymous credential systems [8, 9, 12, 24] allow anonymous yet authenticated and
accountable transactions between users and service providers. As such, they represent a …

A survey of autonomic communications

S Dobson, S Denazis, A Fernández, D Gaïti… - ACM Transactions on …, 2006 - dl.acm.org
Autonomic communications seek to improve the ability of network and services to cope with
unpredicted change, including changes in topology, load, task, the physical and logical …

Relationship-based access control: protection model and policy language

PWL Fong - Proceedings of the first ACM conference on Data and …, 2011 - dl.acm.org
Social Network Systems pioneer a paradigm of access control that is distinct from traditional
approaches to access control. Gates coined the term Relationship-Based Access Control …

Schematizing trust in named data networking

Y Yu, A Afanasyev, D Clark, KC Claffy… - proceedings of the 2nd …, 2015 - dl.acm.org
Securing communication in network applications involves many complex tasks that can be
daunting even for security experts. The Named Data Networking (NDN) architecture builds …

Delegation logic: A logic-based approach to distributed authorization

N Li, BN Grosof, J Feigenbaum - ACM Transactions on Information and …, 2003 - dl.acm.org
We address the problem of authorization in large-scale, open, distributed systems.
Authorization decisions are needed in electronic commerce, mobile-code execution, remote …