enter search term and/or author name
Group-Centric Secure Information-Sharing Models for Isolated Groups
Ram Krishnan, Jianwei Niu, Ravi Sandhu, William H. Winsborough
Article No.: 23
Group-Centric Secure Information Sharing (g-SIS) envisions bringing users and objects together in a group to facilitate agile sharing of information brought in from external sources as well as creation of new information within the group. We...
Combining Discretionary Policy with Mandatory Information Flow in Operating Systems
Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang
Article No.: 24
Discretionary Access Control (DAC) is the primary access control mechanism in today’s major operating systems. It is, however, vulnerable to Trojan Horse attacks and attacks exploiting buggy software. We propose to combine the discretionary...
Access Control Policy Translation, Verification, and Minimization within Heterogeneous Data Federations
Gregory Leighton, Denilson Barbosa
Article No.: 25
Data federations provide seamless access to multiple heterogeneous and autonomous data sources pertaining to a large organization. As each source database defines its own access control policies for a set of local identities, enforcing such...
We ask the question: how can Web sites and data aggregators continually release updated statistics, and meanwhile preserve each individual user’s privacy? Suppose we are given a stream of 0’s and 1’s. We propose a differentially...
The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems
Eric Chan-Tin, Victor Heorhiadi, Nicholas Hopper, Yongdae Kim
Article No.: 27
A network coordinate system assigns Euclidean “virtual” coordinates to every node in a network to allow easy estimation of network latency between pairs of nodes that have never contacted each other. These systems have been implemented...