{SEApp}: Bringing mandatory access control to Android apps

M Rossi, D Facchinetti, E Bacis, M Rosa… - 30th USENIX Security …, 2021 - usenix.org
Mandatory Access Control (MAC) has provided a great contribution to the improvement of
the security of modern operating systems. A clear demonstration is represented by Android …

Enhancing accountability of electronic health record usage via patient-centric monitoring

D Mashima, M Ahamad - Proceedings of the 2nd ACM SIGHIT …, 2012 - dl.acm.org
Electronic Health Record (EHR) and Personal Health Record (PHR) systems could allow
patients to better manage their health information and share it to enhance the quality and …

Identifying extension-based ad injection via fine-grained web content provenance

S Arshad, A Kharraz, W Robertson - Research in Attacks, Intrusions, and …, 2016 - Springer
Extensions provide useful additional functionality for web browsers, but are also an
increasingly popular vector for attacks. Due to the high degree of privilege extensions can …

Content-based access control: Use data content to assist access control for large-scale content-centric databases

W Zeng, Y Yang, B Luo - … Conference on Big Data (Big Data), 2014 - ieeexplore.ieee.org
In conventional database access control models, access control policies are explicitly
specified for each role against each data object. In large-scale content-centric data sharing …

Data usage control for distributed systems

F Kelbert, A Pretschner - ACM Transactions on Privacy and Security …, 2018 - dl.acm.org
Data usage control enables data owners to enforce policies over how their data may be
used after they have been released and accessed. We address distributed aspects of this …

SCIFFS: Enabling secure third-party security analytics using serverless computing

I Polinsky, P Datta, A Bates, W Enck - … of the 26th ACM Symposium on …, 2021 - dl.acm.org
Third-party security analytics allow companies to outsource threat monitoring tasks to teams
of experts and avoid the costs of in-house security operations centers. By analyzing …

An integrated approach for identity and access management in a SOA context

W Hummer, P Gaubatz, M Strembeck, U Zdun… - Proceedings of the 16th …, 2011 - dl.acm.org
In this paper, we present an approach for identity and access management (IAM) in the
context of (cross-organizational) service-oriented architectures (SOA). In particular, we …

Protecting sensitive web content from client-side vulnerabilities with CRYPTONS

X Dong, Z Chen, H Siadati, S Tople, P Saxena… - Proceedings of the …, 2013 - dl.acm.org
Web browsers isolate web origins, but do not provide direct abstractions to isolate sensitive
data and control computation over it within the same origin. As a result, guaranteeing …

Creating secure interactive connections with remote resources

C Hagiu, E Saul, R Mahajan, SA Kuzin, J Chik… - US Patent …, 2015 - Google Patents
Implementations of the present invention efficiently establish secure connections between a
client and server, at least in part by authenticating the client and server early on in the …

Systems and methods for an automatic fresh browser instance for accessing internet content

RA Bazzi, M Zohrevandi - US Patent 10,574,721, 2020 - Google Patents
A system and method for securing access to sensitive content on the web is disclosed. The
approach automates compartmentalization practices for accessing different kinds of content …