-
1
Team and noncooperative solutions to access control with priorities
Published 2010“…We consider decentralized medium-access control in which many pairwise interactions occur between randomly selected users that belong to a large population. …”
Get full text
Article -
2
Nemesis: Preventing Authentication & [and] Access Control Vulnerabilities in Web Applications
Published 2011“…This paper presents Nemesis, a novel methodology for mitigating authentication bypass and access control vulnerabilities in existing web applications. …”
Get full text
Get full text
Article -
3
Finding Security Bugs in Web Applications using a Catalog of Access Control Patterns
Published 2016“…We propose a specification-free technique for finding missing security checks in web applications using a catalog of access control patterns in which each pattern models a common access control use case. …”
Get full text
Get full text
Article -
4
-
5
Encryption-based protection protocols for interactive user-computer communication over physically unsecured channels.
Published 2005Subjects: Get full text
Thesis -
6
-
7
Fully Distributed Work-Conserving MAC Protocols for Opportunistic Optical Hyperchannels
Published 2010“…Light-trail's unidirectional shared-media multicast nature makes it hard to implement distributed access control and restricts that at most one packet transmission can take place at any time. …”
Get full text
Article -
8
Performance assessment of XACML authorizations for Supply Chain Traceability Web Services
Published 2014“…This paper presents an externalized security architecture that uses the eXtensible Access Control Markup Language (XACML) authorization standard to enforce visibility restrictions on trace-ability data in a supply chain where multiple companies collaborate; the performance overheads are assessed by comparing `raw' authorization implementations - Access Control Lists, Tokens, and RDF Assertions - with their XACML-equivalents.…”
Get full text
Get full text
Article -
9
Directions for Web and E-Commerce Applications Security
Published 2003“…This paper provides directions for web and e-commerce applications security. In particular, access control policies, workflow security, XML security and federated database security issues pertaining to the web and ecommerce applications are discussed.…”
Get full text
Working Paper -
10
Enforcing RFID data visibility restrictions using XACML security policies
Published 2013“…In this paper we define an interface for Supply Chain Authorization (SC-Az) and describe the implementation of two visibility restriction mechanisms based on Access Control Lists (ACLs) and Capabilities. Both approaches were converted to the standard eXtensible Access Control Markup Language (XACML) and their correctness and performance was evaluated for supply chains with increasing size.…”
Get full text
Get full text
Article -
11
Improving application security with data flow assertions
Published 2011“…For instance, 23 lines of code detect and prevent three previously-unknown missing access control vulnerabilities in phpBB, a popular Web forum application. …”
Get full text
Get full text
Get full text
Article -
12
A Proposal for Network Coding with the IEEE 802.15.6 Standard
Published 2016“…We examine the Medium Access Control sublayer of the IEEE 802.15.6 Wireless Body Area Network (WBAN) standard, and propose minor modifications to the standard so that linear random network coding can be included to help improve energy efficiency and throughput of WBANs compatible with the standard. …”
Get full text
Get full text
Article -
13
Transparent Accountable Data Mining: New Strategies for Privacy Protection
Published 2006“…From a technology perspective, this requires supplementing legal and technical mechanisms for access control with new mechanisms for transparency and accountability of data use. …”
Get full text
-
14
New Architectural Models for Visibly Controllable Computing: The Relevance of Dynamic Object Oriented Architectures and Plan Based Computing Models
Published 2004“…We also speculate on how the spirit of the Lisp Machine could be extended to include a comprehensive access control model and how new layers of abstraction could further enrich this model.…”
Get full text
-
15
New Architectural Models for Visibly Controllable Computing: The Relevance of Dynamic Object Oriented Architecturesand Plan Based Computing Models
Published 2005“…We also speculate on how the spirit of the Lisp Machine could be extended to include a comprehensive access control model and how new layers of abstraction could further enrich this model.…”
Get full text
-
16
Broadcasting XORs: On the Application of Network Coding in Access Point-to-Multipoint Networks
Published 2014“…We develop a queuing-theoretic model of NC at the medium access control (MAC) sublayer and analyze the impact of NC on packet delay. …”
Get full text
Get full text
Article -
17
Performance analysis of distributed time division multiple access protocols in mobile ad hoc environments
Published 2010“…Tactical wireless mobile ad hoc networks rely upon distributed medium access control (MAC) protocols for coordination and assignment of channel resources among dispersed and mobile users. …”
Get full text
Article -
18
Collision Helps - Algebraic Collision Recovery for Wireless Erasure Networks
Published 2011“…Current medium access control mechanisms are based on collision avoidance and collided packets are discarded. …”
Get full text
Get full text
Article -
19
In Defense of Wireless Carrier Sense
Published 2012“…Carrier sense is often used to regulate concurrency in wireless medium access control (MAC) protocols, balancing interference protection and spatial reuse. …”
Get full text
Get full text
Get full text
Article -
20
CLOUDTHINK: A SCALABLE SECURE PLATFORM FOR MIRRORING TRANSPORTATION SYSTEMS IN THE CLOUD
Published 2018“…We present a novel approach to developing a vehicle communication platform consisting of a low-cost, open-source hardware for moving vehicle data to a secure server, a Web Application Programming Interface (API) for the provision of third-party services, and an intuitive user dashboard for access control and service distribution. The CloudThink infrastructure promotes the commoditization of vehicle telematics data by facilitating easier, flexible, and more secure access. …”
Get full text
Get full text
Get full text
Article