Locked Circuit Indistinguishability: A Notion of Security for Logic Locking | 0 | 0.34 | 2022 |
Cree: A Performant Tool for Safety Analysis of Administrative Temporal Role-Based Access Control (ATRBAC) Policies | 0 | 0.34 | 2021 |
Forensic Analysis in Access Control: Foundations and a Case-Study from Practice | 0 | 0.34 | 2020 |
A computational complexity analysis of tunable type inference for Generic Universe Types | 0 | 0.34 | 2020 |
The Overhead from Combating Side-Channels in Cloud Systems using VM-Scheduling | 1 | 0.35 | 2020 |
The SAT Attack on IC Camouflaging: Impact and Potential Countermeasures | 1 | 0.36 | 2020 |
Strengthening PUFs using Composition | 0 | 0.34 | 2019 |
Constructing cascade bloom filters for efficient access enforcement. | 0 | 0.34 | 2019 |
Logic Locking for Secure Outsourced Chip Fabrication: A New Attack and Provably Secure Defense Mechanism. | 3 | 0.46 | 2017 |
Graph Automorphism-Based, Semantics-Preserving Security for the Resource Description Framework (RDF). | 0 | 0.34 | 2017 |
Reverse engineering camouflaged sequential circuits without scan access. | 4 | 0.39 | 2017 |
Reverse Engineering Camouflaged Sequential Integrated Circuits Without Scan Access. | 1 | 0.36 | 2017 |
The Need for Declarative Properties in Digital IC Security. | 0 | 0.34 | 2017 |
Non-Deterministic Timers for Hardware Trojan Activation (or How a Little Randomness Can Go the Wrong Way). | 0 | 0.34 | 2016 |
Non-Deterministic Timers for Hardware Trojan Activation (or How a Little Randomness Can Go the Wrong Way). | 0 | 0.34 | 2016 |
Integrated Circuit (IC) Decamouflaging: Reverse Engineering Camouflaged ICs within Minutes. | 35 | 1.21 | 2015 |
The UNIX Process Identity Crisis: A Standards-Driven Approach to Setuid | 3 | 0.41 | 2014 |
Mohawk: Abstraction-Refinement and Bound-Estimation for Verifying Access Control Policies | 10 | 0.52 | 2013 |
Securing computer hardware using 3D integrated circuit (IC) technology and split manufacturing for obfuscation | 48 | 1.95 | 2013 |
The Foundational Work of Harrison-Ruzzo-Ullman Revisited | 6 | 0.49 | 2013 |
Property-testing real-world authorization systems | 0 | 0.34 | 2013 |
Least-restrictive enforcement of the Chinese wall security policy | 2 | 0.39 | 2013 |
Panel on granularity in access control | 1 | 0.37 | 2013 |
Relating declarative semantics and usability in access control | 0 | 0.34 | 2012 |
Payments for Outsourced Computations | 2 | 0.39 | 2012 |
Mitigating the intractability of the user authorization query problem in role-based access control (RBAC) | 5 | 0.44 | 2012 |
Automatic error finding in access-control policies | 34 | 0.98 | 2011 |
An empirical assessment of approaches to distributed enforcement in role-based access control (RBAC) | 5 | 0.55 | 2011 |
ARBAC Policy for a Large Multi-National Bank | 2 | 0.39 | 2011 |
An authorization scheme for version control systems | 0 | 0.34 | 2011 |
Access control in practice: pain points | 0 | 0.34 | 2010 |
Role-based access control (RBAC) in Java via proxy objects using annotations | 6 | 0.49 | 2010 |
Method-Specific Java Access Control via RMI Proxy Objects Using Annotations | 1 | 0.38 | 2009 |
Social Learning Applications in Resource Constrained Networks | 0 | 0.34 | 2009 |
Efficient access enforcement in distributed role-based access control (RBAC) deployments | 5 | 0.46 | 2009 |
Resiliency Policies in Access Control | 5 | 0.65 | 2009 |
A Correctness Proof of a Mesh Security Architecture | 7 | 0.82 | 2008 |
Towards Formal Verification of Role-Based Access Control Policies | 64 | 1.88 | 2008 |
A Proof of Security of a Mesh Security Architecture. | 4 | 0.48 | 2007 |
On mutually exclusive roles and separation-of-duty | 61 | 2.03 | 2007 |
A theory for comparing the expressive power of access control models | 20 | 0.89 | 2007 |
Resolving the Micropayment Problem | 1 | 0.37 | 2007 |
Resiliency policies in access control | 10 | 0.72 | 2006 |
Security analysis in role-based access control | 86 | 2.88 | 2006 |
On Safety in Discretionary Access Control | 16 | 0.80 | 2005 |
On mutually-exclusive roles and separation of duty | 88 | 3.75 | 2004 |
Comparing the expressive power of access control models | 21 | 1.04 | 2004 |
Connectivity provisioning with security attributes | 0 | 0.34 | 2001 |