Protecting access to digital resources is one of the fundamental problems recognized in computer security. As yet it remains a challenging problem to work out, starting from the …
Computational science applications are driving a demand for increasingly powerful storage systems. While many techniques are available for capturing the I/O behavior of individual …
N Li, MV Tripunitara - ACM Transactions on Information and System …, 2006 - dl.acm.org
The administration of large role-based access control (RBAC) systems is a challenging problem. In order to administer such systems, decentralization of administration tasks by the …
M Hilty, A Pretschner, D Basin, C Schaefer… - … Security–ESORICS 2007 …, 2007 - Springer
Abstract We present the Obligation Specification Language (OSL), a policy language for distributed usage control. OSL supports the formalization of a wide range of usage control …
R Sandhu, X Zhang - Proceedings of the tenth ACM symposium on …, 2005 - dl.acm.org
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry …
M Hilty, D Basin, A Pretschner - … on Research in Computer Security, Milan …, 2005 - Springer
Access control is concerned with granting access to sensitive data based on conditions that relate to the past or present, so-called provisions. Expressing requirements from the domain …
Protecting kernel integrity is one of the fundamental security objectives in building a trustworthy operating system (OS). For this end, a variety of approaches and systems have …
E Reus, S Field, MJ Healy, J Dadzie… - US Patent …, 2014 - Google Patents
Data management techniques are provided for handling information resources. A data management process can account for attributes of information resources by analyzing or …
X Zhang, Y Li, D Nalla - Proceedings of the 2005 ACM symposium on …, 2005 - dl.acm.org
In traditional access control models like MAC, DAC, and RBAC, authorization decisions are determined according to identities of subjects and objects, which are authenticated by a …