Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- bookDecember 2016
Biometrics in a Data Driven World: Trends, Technologies, and Challenges
Biometrics in a Data Driven World: Trends, Technologies, and Challenges aims to inform readers about the modern applications of biometrics in the context of a data-driven society, to familiarize them with the rich history of biometrics, and to provide ...
- research-articleMarch 2016
Multimodal biometrics for enhanced mobile device security
Fusing information from multiple biometric traits enhances authentication in mobile devices.
- articleJanuary 2015
Policy analysis for administrative role based access control without separate administration
Role based access control RBAC is a widely used approach to access control with well-known advantages in managing authorization policies. This paper considers user-role reachability analysis of administrative role based access control ARBAC, which ...
- ArticleJuly 2013
Policy Analysis for Administrative Role Based Access Control without Separate Administration
Access control is widely used in large systems for restricting resource access to authorized users. In particular, role based access control RBAC is a generalized approach to access control and is well recognized for its many advantages in managing ...
- ArticleJune 2012
Analysis of Scientific Workflow Provenance Access Control Policies
SCC '12: Proceedings of the 2012 IEEE Ninth International Conference on Services ComputingPages 266–273https://doi.org/10.1109/SCC.2012.60Provenance has become an important concept for services computing in general, and for scientific workflows in particular. Provenance often contains confidential data and dependencies whose access needs to be protected. Provenance access control policies ...
- doctoral_thesisJanuary 2012
Efficient policy analysis for administrative role based access control
Role Based Access Control (RBAC) has been widely used for restricting resource access to only authorized users. Administrative Role Based Access Control (ARBAC) specifies permissions for administrators to change RBAC policies. It is often difficult to ...
- research-articleOctober 2011
SPARC: a security and privacy aware virtual machinecheckpointing mechanism
WPES '11: Proceedings of the 10th annual ACM workshop on Privacy in the electronic societyPages 115–124https://doi.org/10.1145/2046556.2046571Virtual Machine (VM) checkpointing enables a user to capture a snapshot of a running VM on persistent storage. VM checkpoints can be used to roll back the VM to a previous "good" state in order to recover from a VM crash or to undo a previous VM ...
- articleMarch 2011
Symbolic reachability analysis for parameterized administrative role-based access control
Computers and Security (CSEC), Volume 30, Issue 2-3Pages 148–164https://doi.org/10.1016/j.cose.2010.08.002Role-based access control (RBAC) is a widely used access control paradigm. In large organizations, the RBAC policy is managed by multiple administrators. An administrative role-based access control (ARBAC) policy specifies how each administrator may ...
- ArticleSeptember 2010
User-role reachability analysis of evolving administrative role based access control
ESORICS'10: Proceedings of the 15th European conference on Research in computer securityPages 455–471Role Based Access Control (RBAC) has been widely used for restricting resource access to only authorized users. Administrative Role Based Access Control (ARBAC) specifies permissions for administrators to change RBAC policies. Due to complex ...
- articleSeptember 2010
Information flow analysis of scientific workflows
Journal of Computer and System Sciences (JCSS), Volume 76, Issue 6Pages 390–402https://doi.org/10.1016/j.jcss.2009.11.002Recently, scientific workflows have emerged as a platform for automating and accelerating data processing and data sharing in scientific communities. Many scientific workflows have been developed for collaborative research projects that involve a number ...
- research-articleJune 2009
Symbolic reachability analysis for parameterized administrative role based access control
SACMAT '09: Proceedings of the 14th ACM symposium on Access control models and technologiesPages 165–174https://doi.org/10.1145/1542207.1542233Role based access control (RBAC) is a widely used access control paradigm. In large organizations, the RBAC policy is managed by multiple administrators. An administrative role based access control (ARBAC) policy specifies how each administrator may ...
- ArticleMarch 2009
RBAC-PAT: A Policy Analysis Tool for Role Based Access Control
TACAS '09: Proceedings of the 15th International Conference on Tools and Algorithms for the Construction and Analysis of Systems: Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2009,Pages 46–49https://doi.org/10.1007/978-3-642-00768-2_4Role-Based Access Control (RBAC) has been widely used for expressing access control policies. Administrative Role-Based Access Control (ARBAC) specifies how an RBAC policy may be changed by each administrator. Because sequences of changes by different ...
- ArticleOctober 2007
Efficient policy analysis for administrative role based access control
CCS '07: Proceedings of the 14th ACM conference on Computer and communications securityPages 445–455https://doi.org/10.1145/1315245.1315300Administrative RBAC (ARBAC) policies specify how Role-Based Access Control (RBAC) policies may be changed by each administrator. It is often difficult to fully understand the effect of an ARBAC policy by simple inspection, because sequences of changes ...