Usage control in computer security: A survey

A Lazouski, F Martinelli, P Mori - Computer Science Review, 2010 - Elsevier
Protecting access to digital resources is one of the fundamental problems recognized in
computer security. As yet it remains a challenging problem to work out, starting from the …

{EASEAndroid}: Automatic Policy Analysis and Refinement for Security Enhanced Android via {Large-Scale}{Semi-Supervised} Learning

R Wang, W Enck, D Reeves, X Zhang, P Ning… - 24th USENIX Security …, 2015 - usenix.org
Mandatory protection systems such as SELinux and SEAndroid harden operating system
integrity. Unfortunately, policy development is error prone and requires lengthy refinement …

Spoke: Scalable knowledge collection and attack surface analysis of access control policy for security enhanced android

R Wang, AM Azab, W Enck, N Li, P Ning… - Proceedings of the …, 2017 - dl.acm.org
SEAndroid is a mandatory access control (MAC) framework that can confine faulty
applications on Android. Nevertheless, the effectiveness of SEAndroid enforcement …

Usage control enforcement-a survey

ÅA Nyre - … Conference on Availability, Reliability, and Security, 2011 - Springer
Sharing information allows businesses to take advantage of hidden knowledge, improve
work processes and cooperation both within and across organisations. Thus there is a need …

[PDF][PDF] 一种基于可信计算的分布式使用控制系统

初晓博, 秦宇 - 计算机学报, 2010 - cjc.ict.ac.cn
摘要随着互联网络等分布式环境的发展, 如何控制已经分发的数据成为一个重要的安全问题.
最近提出的使用控制概念和模型虽然适用于描述该类问题, 但其实施机制研究仍处于起步阶段 …

Sandscout: Automatic detection of flaws in ios sandbox profiles

L Deshotels, R Deaconescu, M Chiroiu, L Davi… - Proceedings of the …, 2016 - dl.acm.org
Recent literature on iOS security has focused on the malicious potential of third-party
applications, demonstrating how developers can bypass application vetting and code-level …

Uclinux: a linux security module for trusted-computing-based usage controls enforcement

D Kyle, JC Brustoloni - Proceedings of the 2007 ACM workshop on …, 2007 - dl.acm.org
Usage controls allow the distributor of some information to limit how recipients of that
information may use it. The Trusted Computing Group has standardized Trusted Platform …

Dimensionality reduction and clustering on statistical manifolds

SM Lee, AL Abbott, PA Araman - 2007 IEEE Conference on …, 2007 - ieeexplore.ieee.org
Dimensionality reduction and clustering on statistical manifolds is presented. Statistical
manifold [16] is a 2D Riemannian manifold which is statistically defined by maps that …

Measuring privacy compliance with process specifications

S Banescu, N Zannone - 2011 Third International Workshop on …, 2011 - ieeexplore.ieee.org
Enforcement relies on the idea that infringements are violations and as such should not be
allowed. However, this notion is very restrictive and cannot be applied in unpredictable …

Behavioral attestation for web services (BA4WS)

M Alam, X Zhang, M Nauman, T Ali - … of the 2008 ACM workshop on …, 2008 - dl.acm.org
Service Oriented Architecture with underlying technologies like web services and web
service orchestration opens new vistas for integration among business processes operating …