What people are saying - Write a review
We haven't found any reviews in the usual places.
Access Control in an Open Distributed Environment
Ensuring Continuity During Dynamic Security Policy Reconfiguration in DTE
Composing PartiallySpecified Systems
13 other sections not shown
Other editions - View all
access control algorithm allow analysis applet application approach assume attack authentication biometric bits browser buffer overflow certificate client component composition Computer constraints covert channels credential record cryptographic database decryption defined described digital signature doctor-B domain encryption eng-filter environment example execution fair exchange fault injection function graphics server hash hash function IEEE implementation input Java label mobile agent mobile code module node off-line operations OpSet password patient-A playground principal hierarchy private key proof protocol proxy ps-reads ps-writes public key queue random RBAC RBAC system real-time requirements role RoleSet router Section Security and Privacy security levels security policy security violations semantic security Separation of Duty signature scheme SoD properties specification stack frame stack inspection static strand space subnetwork telnet Theorem tion transactions Trojan horse types UNIX user's valid verifier vulnerability WATCHERS