the proceedings contain 28 papers. the topics discussed include: An approach to evaluate policy similarity;a posteriori compliance control;enforcing accesscontrol over data streams;fine-grained accesscontrol to web ...
详细信息
ISBN:
(纸本)1595937455
the proceedings contain 28 papers. the topics discussed include: An approach to evaluate policy similarity;a posteriori compliance control;enforcing accesscontrol over data streams;fine-grained accesscontrol to web databases;privacy-aware role based accesscontrol;a privacy preserving assertion based policy language for federation systems;distributed accesscontrol: a privacy-conscious approach;towards a VMM-based usage control framework for OS kernel integrity protection;managing the risk of covert information flows in virtual machine systems;a logical specification and analysis for SELinux MLS policy;Mesh: secure, lightweight grid middleware using existing SSH infrastructure;multilevel filesystems in solaris trusted extensions;a formal approach for testing security rules;new constructions for provably-secure time-bound hierarchical key assignment schemes;and role engineering using graph optimization.
there have been two parallel themes in accesscontrol research in recent years. On the one hand there are efforts to develop new accesscontrolmodels to meet the policy needs of real world application domains. In par...
详细信息
ISBN:
(纸本)9781605581293
there have been two parallel themes in accesscontrol research in recent years. On the one hand there are efforts to develop new accesscontrolmodels to meet the policy needs of real world application domains. In parallel, and almost separately, researchers have developed policy languages for accesscontrol. this paper is motivated by the consideration that these two parallel efforts need to develop synergy. A policy language in the abstract without ties to a model gives the designer little guidance. Conversely a model may not have the machinery to express all the policy details of a given system or may deliberately leave important aspects unspecified. Our vision for the future is a world where advanced accesscontrol concepts are embodied in modelsthat are supported by policy languages in a natural intuitive manner, while allowing for details beyond the models to be further specified in the policy *** paper studies the relationship between the Web Ontology Language (OWL) and the Role Based accesscontrol (RBAC) model. Although OWL is a web ontology language and not specifically designed for expressing authorization policies, it has been used successfully for this purpose in previous work. OWL is a leading specification language for the Semantic Web, making it a natural vehicle for providing accesscontrol in that context. In this paper we show two different ways to support the NIST Standard RBAC model in OWL and then discuss how the OWL constructions can be extended to model attribute-based RBAC or more generally attribute-based accesscontrol. We further examine and assess OWL's suitability for two other accesscontrol problems: supporting attribute based accesscontrol and performing security analysis in a trust-management framework.
Huge investments have been used to roll out broadband networks during the recent years. Long-term broadband demand forecasts have been and are crucial for investments decisions, rollouts and dimensioning of the networ...
详细信息
Huge investments have been used to roll out broadband networks during the recent years. Long-term broadband demand forecasts have been and are crucial for investments decisions, rollouts and dimensioning of the networks. the main broadband accesstechnologies have been DSL and Cable modem (Hybrid Fiber Coax). Also other technologies like fiber (FTTx) and fixed radio access are entering the market. Especially in Japan, Hong Kong and Korea, the growth of FTTx has been significant during the last years. However, the fiber access evolution in Western Europe has been quite modest. To cover the residual broadband market, technologies like WiMAX and mobile broadband are needed. the forecasting models are based on four parameters Logistic models and substitution effects between demands for different broadband technologies. For mobile broadband limited demand data, so far, are available. In addition specific attention is put on FTTx which is the long-term ultimate broadband solution. the long-term FTTx forecasts for Western Europe are dependent of a set of assumptions like time delay, regulatory aspects, degree of densely populated areas etc. the access forecasts for Western Europe show that the dominating technology, DSL, soon start to loose market share.
Different sections of a cache memory may experience different temperature profiles depending on their proximity to other active logic units such as the execution unit. In this paper, we perform thermal analysis of cac...
详细信息
Different sections of a cache memory may experience different temperature profiles depending on their proximity to other active logic units such as the execution unit. In this paper, we perform thermal analysis of cache memories under the influence of hot-spots. In particular, 8-T SRAM bit cell is chosen because of its robust functionality at nano-scaled technologies. thermal map of entire 8-T SRAM cache is generated using hierarchical compact thermal models while solving the leakage and temperature self consistently. the impact of spatial temperature variations on 8T-SRAM parameters such as local bitline (LBL) sensing delay, noise robustness and bitcell stability are evaluated for 45nm/32nm/22nm bulk CMOS technology nodes. the effectiveness of variable keeper sizing on LBL sensing delay is analyzed. It is predicted that at 22 nm node, the leakage induced temperature rise has severe effects on the 8-T SRAM characteristics.
Usage control (UCON) models, similar to accesscontrolmodels, control and govern the users' access to resources and services that, are available in the system. One of the major improvements of UCON over tradition...
详细信息
ISBN:
(纸本)9781595937452
Usage control (UCON) models, similar to accesscontrolmodels, control and govern the users' access to resources and services that, are available in the system. One of the major improvements of UCON over traditional accesscontrolmodels is the continuity of the control and the concept of attribute mutability. In this paper we provide an alternative formalisation of the UCON model that relaxes many of the assumptions made in earlier formalisations of the model. We question the enforceability of UCON policies
We introduce a generalization of Role-based accesscontrolthat we call the Action-Status accesscontrol (ASAC) model. ASAC model addresses certain shortcomings with RBAC models when applied in distributed computing c...
详细信息
ISBN:
(纸本)9781595937452
We introduce a generalization of Role-based accesscontrolthat we call the Action-Status accesscontrol (ASAC) model. ASAC model addresses certain shortcomings with RBAC models when applied in distributed computing contexts. the ASAC model is based on the notion of status. and a nonmonotonic theory of accesscontrolthat is founded upon the notions of events, actions and times. the approach allows automatic changes to be made to policy requirements and agent authorizations that amy be based, in part, on all agent's intentional behaviors.
accesscontrol is an important component of any computational system. However, it is only recently that mechanisms to guard against unauthorized access for streaming data have been proposed. In this paper, we study ho...
详细信息
ISBN:
(纸本)9781595937452
accesscontrol is an important component of any computational system. However, it is only recently that mechanisms to guard against unauthorized access for streaming data have been proposed. In this paper, we study how to enforce the role-based accesscontrol model proposed by us in [5]. We design a set of novel secure operators, that basically filter out tuples/attributes from results of the corresponding (non-secure) operators that are not accessible according to the specified accesscontrol policies. We further develop an accesscontrol mechanism to enforce the accesscontrol policies based oil these operators. We show that our method is secure according to the specified policies.
Privacy has been acknowledged to be a critical requirement for many business (and non-business) environments. therefore, the definition of all expressive and easy-to-use privacy-related accesscontrol model, based oil...
详细信息
ISBN:
(纸本)9781595937452
Privacy has been acknowledged to be a critical requirement for many business (and non-business) environments. therefore, the definition of all expressive and easy-to-use privacy-related accesscontrol model, based oil which privacy policies call be specified, is crucial. In this work we introduce a family of models (P-RBAC) that extend the well known RBAC model in order to provide full support for expressing highly complex privacy-related policies, taking into account features like purposes and obligations. We also compare our work withaccesscontrol and privacy policy frameworks such as P3P, EPAL, and XacmL.
Previous research examining the mapping of discretionary accesscontrol (DAC) to role-based accesscontrol (RBAC) has considered neither ownership nor further granting of privileges. We show how to accomplish this by ...
详细信息
ISBN:
(纸本)9781595937452
Previous research examining the mapping of discretionary accesscontrol (DAC) to role-based accesscontrol (RBAC) has considered neither ownership nor further granting of privileges. We show how to accomplish this by mapping from a relational database environment to the administrative role graph model (ARGM) of Wang and Osborn. the goals of the research are to determine if the ARGM has sufficient, features to accomplish this mapping, and to study whether the grant operation in relational databases should be modeled as administration or as delegation. Our conclusion is that the ARGM can simulate both ownership and granting without requiring a delegation model.
Before the Web era, databases were well-protected by using the standard accesscontrol techniques such as Views and SQL authorization commands. But withthe development of web systems, the number of attacks oil databa...
详细信息
ISBN:
(纸本)9781595937452
Before the Web era, databases were well-protected by using the standard accesscontrol techniques such as Views and SQL authorization commands. But withthe development of web systems, the number of attacks oil databases increased and it has become clear that their accesscontrol mechanism is inadequate for web-based systems. In particular, the SQL Injection and other vulnerabilities have received considerable attention in recent years, and satisfactory solutions to these kinds of attacks are still lacking. We present a new method For protecting web databases that is based on fine-grained accesscontrol mechanism. this method uses the databases' built-in accesscontrol mechanisms enhanced with Parameterized Views and adapts them to work with web applications. the proposed accesscontrol mechanism is applicable for any existing databases and is capable to prevent many kinds of attacks, thus significantly decreases the web databases' attack Surface.
暂无评论