Although process control rooms are advanced digital environments with a multitude of desktop and large displays, there still exists a gap between the interaction technologies being employed in pervasive displays used ...
详细信息
In this talk I will begin with a brief look at current trends in the technology scenery and some of the key security challenges that are impacting on business and society. In particular, on the one hand there have bee...
详细信息
the proceedings contain 22 papers. the topics discussed include: hardware-enhanced distributed access enforcement for role-based accesscontrol;an accesscontrol concept for novel automotive HMI systems;monitor placem...
ISBN:
(纸本)9781450329392
the proceedings contain 22 papers. the topics discussed include: hardware-enhanced distributed access enforcement for role-based accesscontrol;an accesscontrol concept for novel automotive HMI systems;monitor placement for large-scale systems;anomaly detection and visualization in generative RBAC models;reduction of accesscontrol decisions;towards more usable information flow policies for contemporary operating systems;attribute based accesscontrol for APIs in spring security;comprehensive integrity protection for desktop Linux;game theoretic analysis of multiparty accesscontrol in online social networks;scalable and precise automated analysis of administrative temporal role-based accesscontrol;accesscontrolmodels for geo-social computing systems;limiting access to unintentionally leaked sensitive documents using malware signatures;and user-centric identity as a service-architecture for eIDs with selective attribute disclosure.
Publicly Verifiable Outsourced Computation (PVC) allows devices with restricted resources to delegate computations to more powerful external servers, and to verify the correctness of results. Whilst beneficial in many...
详细信息
Single-ISA heterogeneous multicore processors have gained increasing popularity withthe introduction of recent technologies such as ARM ***. these processors offer increased energy efficiency through combining low po...
详细信息
ISBN:
(纸本)9781509035328
Single-ISA heterogeneous multicore processors have gained increasing popularity withthe introduction of recent technologies such as ARM ***. these processors offer increased energy efficiency through combining low power in-order cores with high performance out-of-order cores. Efficiently exploiting this attractive feature requires careful management so as to meet the demands of targeted applications. In this paper, we explore the design of those architectures based on the ARM *** technology by modeling performance and power in gem5 and McPAT frameworks. Our models are validated w.r.t. the Samsung Exynos 5 Octa (5422) chip. We show average errors of 20% in execution time, 13% for power consumption and 24% for energy-to-solution.
We address the generation and analysis of hard instances for verification problems in accesscontrolthat are NP-hard. Given the customary assumption that P = NP, we know that such classes exist. We focus on a particu...
详细信息
ISBN:
(纸本)9781450335560
We address the generation and analysis of hard instances for verification problems in accesscontrolthat are NP-hard. Given the customary assumption that P = NP, we know that such classes exist. We focus on a particular problem, the user-authorization query problem (UAQ) in Role-Based accesscontrol (RBAC). We show how to systematically generate hard instances for it. We then analyze what we call the structure of those hard instances. Our work brings the important aspect of systematic investigation of hard input classes to accesscontrol research.
Nowadays in popular online social networks users can blacklist some of their friends in order to disallow them to access resources that other non-blacklisted friends may access. We identify three independent binary de...
详细信息
ISBN:
(纸本)9781450335560
Nowadays in popular online social networks users can blacklist some of their friends in order to disallow them to access resources that other non-blacklisted friends may access. We identify three independent binary decisions to utilize users' blacklists in accesscontrol policies, resulting into eight access restrictions. We formally define these restrictions in a hybrid logic for relationship-based accesscontrol, and provide syntactical transformations to rewrite a hybrid logic accesscontrol formula when fixing an access restriction. this enables a flexible and user-friendly approach for restricting access in social networks. We develop efficient algorithms for enforcing a subset of accesscontrol policies with restrictions. the effectiveness of the access restrictions and the efficiency of our algorithms are evaluated on a Facebook dataset.
Cloud storage platforms promise a convenient way for users to share files and engage in collaborations, yet they require all files to have a single owner who unilaterally makes accesscontrol decisions. Existing cloud...
详细信息
In this paper, we present a novel, semi-automated approach to infer accesscontrol policies automatically for web-based applications. Our goal is to support the validation of implemented accesscontrol policies, even ...
详细信息
暂无评论