𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Typing access control and secure information flow in sessions

✍ Scribed by Capecchi, Sara; Castellani, Ilaria; Dezani-Ciancaglini, Mariangiola


Book ID
126700860
Publisher
Elsevier Science
Year
2014
Tongue
English
Weight
888 KB
Volume
238
Category
Article
ISSN
0890-5401

No coin nor oath required. For personal study only.


πŸ“œ SIMILAR VOLUMES


Information Flow Control for Secure Clou
✍ Bacon, Jean; Eyers, David; Pasquier, Thomas F. J.-M.; Singh, Jatinder; Papagiann πŸ“‚ Article πŸ“… 2014 πŸ› Institute of Electrical and Electronics Engineers 🌐 English βš– 832 KB
[Advances in Information Security] Adapt
✍ Kayem, Anne V. D. M.; Akl, Selim G.; Martin, Patrick πŸ“‚ Article πŸ“… 2010 πŸ› Springer US 🌐 English βš– 637 KB

Cryptographic access control (CAC) is an approach to securing data by encrypting it with a key, so that only the users in possession of the correct key are able to decrypt the data and/or perform further encryptions. Applications of cryptographic access control will benefit companies, governments an

[Advances in Information Security] Adapt
✍ Kayem, Anne V. D. M.; Akl, Selim G.; Martin, Patrick πŸ“‚ Article πŸ“… 2010 πŸ› Springer US 🌐 English βš– 1019 KB

Cryptographic access control (CAC) is an approach to securing data by encrypting it with a key, so that only the users in possession of the correct key are able to decrypt the data and/or perform further encryptions. Applications of cryptographic access control will benefit companies, governments an

Homeland security and information contro
✍ Terrence A. Maxwell πŸ“‚ Article πŸ“… 2005 πŸ› Wiley (John Wiley & Sons) 🌐 English βš– 739 KB

## Abstract In response to international terrorism, the United States government has actively sought to reorganize information flows to and from individuals, the media, and other nations. These government actions lead to information asymmetry, with certain realms becoming relatively β€˜information po