Results 1 - 10
of
2,496
Fine-Grained Control of Security Capabilities
- ACM Transactions on Internet Technology
, 2004
"... We present a new approach for fine-grained control over users ’ security privileges (fast revocation of credentials) centered around the concept of an on-line semi-trusted mediator (SEM). The use of a SEM in conjunction with a simple threshold variant of the RSA cryptosystem (mediated RSA) offers a ..."
Abstract
-
Cited by 19 (3 self)
- Add to MetaCart
We present a new approach for fine-grained control over users ’ security privileges (fast revocation of credentials) centered around the concept of an on-line semi-trusted mediator (SEM). The use of a SEM in conjunction with a simple threshold variant of the RSA cryptosystem (mediated RSA) offers a
Selective Replication: Fine-Grain Control of Replicated Files
, 1995
"... of the Thesis Selective Replication: Fine-Grain Control of Replicated Files by David H. Ratner Master of Science in Computer Science University of California, Los Angeles, 1995 Professor Gerald J. Popek, Co-Chair Professor Wesley W. Chu, Co-Chair Modern methods of reliable and efficient data sha ..."
Abstract
-
Cited by 13 (3 self)
- Add to MetaCart
of the Thesis Selective Replication: Fine-Grain Control of Replicated Files by David H. Ratner Master of Science in Computer Science University of California, Los Angeles, 1995 Professor Gerald J. Popek, Co-Chair Professor Wesley W. Chu, Co-Chair Modern methods of reliable and efficient data
Fine-Grained Control of Java Applets Using a Simple Constraint Language
, 1997
"... The use of the internet has increased extensively with a growing number of inexperienced users surfing the Web. Lurking in Web pages, Java applets are automatically executed on users' machines. As a result, popular Web browsers are understandably conservative on what they allow Java applets to ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
to do. However, this places a heavy restriction on applets which drastically limits their capabilities. Therefore, we have developed a constraint language in which naive users can specify their fine-grained control over applets without needing to know the the intricacies of applet security. We have
Fine-Grained Control of Java Applets Using a Simple Constraint Language
, 1997
"... The use of the internet has increased extensively with a growing number of inexperienced users surfing the Web. Lurking in Web pages, Java applets are automatically executed on users' machines. As a result, popular Web browsers are understandably conservative on what they allow Java applets to ..."
Abstract
- Add to MetaCart
to do. However, this places a heavy restriction on applets which drastically limits their capabilities. Therefore, we have developed a constraint language in which naive users can specify their fine-grained control over applets without needing to know the the intricacies of applet security. We have
Control jujutsu: On the weaknesses of fine-grained control flow integrity
- In ACM SIGSAC Conference on Computer and Communications Security, CCS
, 2015
"... ABSTRACT Control flow integrity (CFI) has been proposed as an approach to defend against control-hijacking memory corruption attacks. CFI works by assigning tags to indirect branch targets statically and checking them at runtime. Coarse-grained enforcements of CFI that use a small number of tags to ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
. These flexibilities allow an attacker to gain control of the execution while strictly adhering to a fine-grained CFI. We then construct two proof-of-concept exploits that attack an unlimited tag CFI system with a shadow stack. We also evaluate the difficulties of generating a precise CFG using scalable static
Fine-Grained Control-Flow Integrity through Binary Hardening
"... Abstract. Applications written in low-level languages without type or memory safety are prone to memory corruption. Attackers gain code execution capabilities through memory corruption despite all currently deployed defenses. Control-Flow Integrity (CFI) is a promising security property that restric ..."
Abstract
-
Cited by 5 (2 self)
- Add to MetaCart
that restricts indirect control-flow transfers to a static set of well-known locations. We present Lockdown, a modular, fine-grained CFI policy that pro-tects binary-only applications and libraries without requiring source-code. Lockdown adaptively discovers the control-flow graph of a running process based
Open Access Method for Ultra-precision FPU Integration based on Fine-Grained Control
"... Abstract: In general, the FPU and processor are decoupled in the method for FPU integration, in which the communica-tion between them requires software intervention and ultra-precision FPU is unsupported. To avoid this problem, a method based on fine-grained control for integration of FPU into the R ..."
Abstract
- Add to MetaCart
Abstract: In general, the FPU and processor are decoupled in the method for FPU integration, in which the communica-tion between them requires software intervention and ultra-precision FPU is unsupported. To avoid this problem, a method based on fine-grained control for integration of FPU
A.: A fine-grained, controllable, user-to-user delegation method in RBAC
- Proc. of the Symp. on Access Control Models and Technologies (SACMAT
, 2005
"... This paper addresses the issues surrounding user-to-user delegation in RBAC. We show how delegations can be incorporated into the RBAC model in a simple and straightforward manner. A special feature of the model is that it allows finegrained control over what rights a user wishes to delegate as oppo ..."
Abstract
-
Cited by 26 (0 self)
- Add to MetaCart
This paper addresses the issues surrounding user-to-user delegation in RBAC. We show how delegations can be incorporated into the RBAC model in a simple and straightforward manner. A special feature of the model is that it allows finegrained control over what rights a user wishes to delegate
ONTOLOGIES AND FINE-GRAINED CONTROL OVER SHARING OF ENGINEERING MODELING KNOWLEDGE IN A WEB BASED ENGINEERING ENVIRONMENT
"... ABSTRACT Within the knowledge modeling community the use of ontologies in the construction of knowledge intensive systems is now widespread. Ontologies are used to facilitate knowledge sharing, reuse, agent interoperability and knowledge acquisition. We have developed an ontology for representing a ..."
Abstract
- Add to MetaCart
environment downloadable from protégé.stanford.edu. possible fine grain knowledge sharing. Both the methods acting together enable automatic generation of recipient-specific technical reports based on the recipient's security permissions, customized knowledge viewing, and customized knowledge exporting
Coca: A Debugger for C Based on Fine Grained Control Flow and Data Events
, 1998
"... We present Coca, an automated debugger for C, where the breakpoint mechanism is based on events related to language constructs. Events have semantics whereas source lines used by most debuggers do not have any. A trace is a sequence of events. It can be seen as an ordered relation in a database. Use ..."
Abstract
-
Cited by 5 (0 self)
- Add to MetaCart
. Users can specify precisely which events they want to see by specifying values for event attributes. At each event, visible variables can be queried. The trace query language is Prolog with a handful of primitives. The trace query mechanism searches through the execution traces using both control flow
Results 1 - 10
of
2,496