Quantcast
Channel: Publications of the Laboratory for Education and Research in Secure Systems Engineering (LERSSE)
Browsing all 22 articles
Browse latest View live

Flooding and Recycling Authorizations

The request-response paradigm used for access control solutions commonly leads to point-to-point (PTP) architectures with security enforcement logic obtaining decisions from the authorization servers...

View Article



A Method for Assessing the Trustworthiness of an Entity by Cooperating...

In this thesis a Model of Trust based on Bayesian Networks is introduced. The model determines the trustworthiness of a new or hitherto unknown entity by utilizing information exchanged with...

View Article

A Framework for Implementing Role-based Access Control Using CORBA Security...

The paper shows how role-based access control (RBAC) models could be implemented using CORBA Security service. A configuration of CORBA protection system is defined. We provide definitions of RBAC0 and...

View Article

A Design of An Authorization Service

Outline: • CORBA security model • What CORBA Access Model does[ not] Cover • Healthcare Resource Access Control (H-RAC) high level view • Authorization Service framework design details

View Article

A Framework for Implementing Role-based Access Control Using CORBA Security...

The presentation shows how role-based access control (RBAC) models could be implemented using CORBA Security service. A configuration of CORBA protection system is defined. We provide definitions of...

View Article


A Framework for Implementing Role-based Access Control Using CORBA Security...

The presentation shows how role-based access control (RBAC) models could be implemented using CORBA Security service. A configuration of CORBA protection system is defined. We provide definitions of...

View Article

A Resource Access Decision Service for CORBA-based Distributed Systems

Decoupling authorization logic from application logic allows applications with fine-grain access control requirements to be independent from a particular access control policy and from factors that are...

View Article

Access Control

Learning objectives: Comprehend the principles behind access control mechanisms used in today\\\\\\\'s: * operating systems, * middleware, * virtual machines. Overview: In this module, the principles...

View Article


Access Control Architectures: COM+ vs. EJB

This tutorial provides an overview of access control mechanisms in two most popular commercial middleware technologies, COM+ and EJB. Three main aspects of the mechanisms are explained: a) how...

View Article


Applying Aspect-Orientation in Designing Security Systems: A Case Study

As a security policy model evolves, the design of security systems using that model could become increasingly complicated. It is necessary to come up with an approach to guide the development, reuse...

View Article

Architectural Separation of Authorization and Application Logic in...

Security is an essential feature and foremost concern to enterprise software systems. Today, application-level access control (and other security) functions are based on complex, fine-grain and/or...

View Article

Attribute Function: an Enabler for Effective Inexpensive Application-specific...

Security is an essential feature and foremost concern to Internet and enterprise distributed software applications. However, the adoption of secure distributed applications by commercial and government...

View Article

Design and Implementation of Resource Access Decision Server

Decoupling authorization decision logic enables implementation of complex and consistent access control policies across heterogeneous systems. However, this is difficult, if not impossible to implement...

View Article


Engineering Access Control for Distributed Enterprise Applications

Access control (AC) is a necessary defense against a large variety of security attacks on the resources of distributed enterprise applications. However, to be effective, AC in some application domains...

View Article

Engineering Application-level Access Control in Distributed Systems

This chapter discusses issues of engineering access control solutions in distributed applications for enterprise computing environments. It reviews application-level access control available in...

View Article


Flooding and Recycling Authorizations

The request-response paradigm used for access control solutions commonly leads to point-to-point (PTP) architectures with security enforcement logic obtaining decisions from the authorization servers...

View Article

Future Direction of Access Control Models, Architectures, and Technologies

The goal of this panel is to explore future directions in the research and practice of Access Control Models, Architectures, and Technologies (ACMAT). The panelists will offer their (speculative)...

View Article


Improving Practical Security Engineering: Overview of the Ongoing Research

Security engineering is about creating viable solutions to real-world security problems-solutions that would address the requirements, be cost-effective, competitive, and yet be subject to the...

View Article

JAMES: Junk Authorizations for Massive-scale Enterprise Services

The request-response paradigm used for distributed access control solutions commonly leads to point-to-point (PTP) architectures with security enforcement logic obtaining decisions from the...

View Article

Object Security Attributes: Enabling Application-specific Access Control in...

This paper makes two primary contributions toward establishing support for application-specific factors in middleware security mechanisms. First, it develops a simple classification framework for...

View Article
Browsing all 22 articles
Browse latest View live




Latest Images