publié le: July 2010
Previous work has shown that distributed authorization systems that fail to sample a consistent snapshot of the underlying system during policy evalu...
The SELinux mandatory access control (MAC) policy has recently added a multilevel security (MLS) model which is able to express a fine granularity of...
publié le: December 2010
This article presents new protocols for onion routing anonymity networks. We define a provably secure privacy-preserving key agreement scheme in an i...
Storage-based intrusion detection consists of storage systems watching for and identifying data access patterns characteristic of system intrusions....
Attribute-Based Messaging (ABM) enables messages to be addressed using attributes of recipients rather than an explicit list of recipients. Such mess...