Showing 1 - 20 results of 31 for search '"access control"', query time: 0.16s Refine Results
  1. 1

    Team and noncooperative solutions to access control with priorities by Suárez, Alberto, Altman, Eitan, Menache, Ishai

    Published 2010
    “…We consider decentralized medium-access control in which many pairwise interactions occur between randomly selected users that belong to a large population. …”
    Get full text
    Article
  2. 2

    Nemesis: Preventing Authentication & [and] Access Control Vulnerabilities in Web Applications by Dalton, Michael, Kozyrakis, Christos, Zeldovich, Nickolai

    Published 2011
    “…This paper presents Nemesis, a novel methodology for mitigating authentication bypass and access control vulnerabilities in existing web applications. …”
    Get full text
    Get full text
    Article
  3. 3

    Finding Security Bugs in Web Applications using a Catalog of Access Control Patterns by Near, Joseph Paul, Jackson, Daniel

    Published 2016
    “…We propose a specification-free technique for finding missing security checks in web applications using a catalog of access control patterns in which each pattern models a common access control use case. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5
  6. 6
  7. 7

    Fully Distributed Work-Conserving MAC Protocols for Opportunistic Optical Hyperchannels by Chen, Jing, Wang, Jiaping, Yu, Hui, Gumaste, Ashwin, Zheng, S. Q.

    Published 2010
    “…Light-trail's unidirectional shared-media multicast nature makes it hard to implement distributed access control and restricts that at most one packet transmission can take place at any time. …”
    Get full text
    Article
  8. 8

    Performance assessment of XACML authorizations for Supply Chain Traceability Web Services by Pardal, Miguel L., Harrison, Mark, Sarma, Sanjay Emani, Marques, Jose Alves

    Published 2014
    “…This paper presents an externalized security architecture that uses the eXtensible Access Control Markup Language (XACML) authorization standard to enforce visibility restrictions on trace-ability data in a supply chain where multiple companies collaborate; the performance overheads are assessed by comparing `raw' authorization implementations - Access Control Lists, Tokens, and RDF Assertions - with their XACML-equivalents.…”
    Get full text
    Get full text
    Article
  9. 9

    Directions for Web and E-Commerce Applications Security by Thuraisingham, Bhavani, Clifton, Chris, Gupta, Amar, Bertino, Elisa, Ferrari, Elena

    Published 2003
    “…This paper provides directions for web and e-commerce applications security. In particular, access control policies, workflow security, XML security and federated database security issues pertaining to the web and ecommerce applications are discussed.…”
    Get full text
    Working Paper
  10. 10

    Enforcing RFID data visibility restrictions using XACML security policies by Pardal, Miguel L., Harrison, Mark, Marques, Jose Alves, Sarma, Sanjay Emani

    Published 2013
    “…In this paper we define an interface for Supply Chain Authorization (SC-Az) and describe the implementation of two visibility restriction mechanisms based on Access Control Lists (ACLs) and Capabilities. Both approaches were converted to the standard eXtensible Access Control Markup Language (XACML) and their correctness and performance was evaluated for supply chains with increasing size.…”
    Get full text
    Get full text
    Article
  11. 11

    Improving application security with data flow assertions by Yip, Alexander, Wang, Xi, Zeldovich, Nickolai, Kaashoek, M. Frans

    Published 2011
    “…For instance, 23 lines of code detect and prevent three previously-unknown missing access control vulnerabilities in phpBB, a popular Web forum application. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    A Proposal for Network Coding with the IEEE 802.15.6 Standard by Shi, Xiaomeng, Medard, Muriel

    Published 2016
    “…We examine the Medium Access Control sublayer of the IEEE 802.15.6 Wireless Body Area Network (WBAN) standard, and propose minor modifications to the standard so that linear random network coding can be included to help improve energy efficiency and throughput of WBANs compatible with the standard. …”
    Get full text
    Get full text
    Article
  13. 13

    Transparent Accountable Data Mining: New Strategies for Privacy Protection by Weitzner, Daniel J., Abelson, Harold, Berners-Lee, Tim, Hanson, Chris, Hendler, James, Kagal, Lalana, McGuinness, Deborah L., Sussman, Gerald Jay, Waterman, K. Krasnow

    Published 2006
    “…From a technology perspective, this requires supplementing legal and technical mechanisms for access control with new mechanisms for transparency and accountability of data use. …”
    Get full text
  14. 14

    New Architectural Models for Visibly Controllable Computing: The Relevance of Dynamic Object Oriented Architectures and Plan Based Computing Models by Shrobe, Howard, Laddaga, Robert

    Published 2004
    “…We also speculate on how the spirit of the Lisp Machine could be extended to include a comprehensive access control model and how new layers of abstraction could further enrich this model.…”
    Get full text
  15. 15

    New Architectural Models for Visibly Controllable Computing: The Relevance of Dynamic Object Oriented Architecturesand Plan Based Computing Models by Shrobe, Howard, Laddaga, Robert

    Published 2005
    “…We also speculate on how the spirit of the Lisp Machine could be extended to include a comprehensive access control model and how new layers of abstraction could further enrich this model.…”
    Get full text
  16. 16

    Broadcasting XORs: On the Application of Network Coding in Access Point-to-Multipoint Networks by Fouli, Kerim, Casse, Jerome, Sergeev, Ivan, Medard, Muriel, Maier, Martin

    Published 2014
    “…We develop a queuing-theoretic model of NC at the medium access control (MAC) sublayer and analyze the impact of NC on packet delay. …”
    Get full text
    Get full text
    Article
  17. 17

    Performance analysis of distributed time division multiple access protocols in mobile ad hoc environments by Dastangoo, Siamak, Macdonald, Thomas G.

    Published 2010
    “…Tactical wireless mobile ad hoc networks rely upon distributed medium access control (MAC) protocols for coordination and assignment of channel resources among dispersed and mobile users. …”
    Get full text
    Article
  18. 18

    Collision Helps - Algebraic Collision Recovery for Wireless Erasure Networks by Medard, Muriel, Parandehgheibi, Ali, Sundararajan, Jay-Kumar

    Published 2011
    “…Current medium access control mechanisms are based on collision avoidance and collided packets are discarded. …”
    Get full text
    Get full text
    Article
  19. 19

    In Defense of Wireless Carrier Sense by Brodsky, Micah Z. (Micah Zev), Morris, Robert Tappan

    Published 2012
    “…Carrier sense is often used to regulate concurrency in wireless medium access control (MAC) protocols, balancing interference protection and spatial reuse. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    CLOUDTHINK: A SCALABLE SECURE PLATFORM FOR MIRRORING TRANSPORTATION SYSTEMS IN THE CLOUD by Wilhelm, Erik, Mayer, Simon, Sadamori, Leyna, Dsouza, Sohan, Chau, Chi-Kin, Siegel, Joshua E, Sarma, Sanjay E

    Published 2018
    “…We present a novel approach to developing a vehicle communication platform consisting of a low-cost, open-source hardware for moving vehicle data to a secure server, a Web Application Programming Interface (API) for the provision of third-party services, and an intuitive user dashboard for access control and service distribution. The CloudThink infrastructure promotes the commoditization of vehicle telematics data by facilitating easier, flexible, and more secure access. …”
    Get full text
    Get full text
    Get full text
    Article