Skip to search formSkip to main contentSkip to account menu

Reference monitor

In operating systems architecture a reference monitor concept defines a set of design requirements on a reference validation mechanism, which… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
With the growing use of smartphones and other mobile devices, it becomes essential to be able to assure the user that his system… 
2011
2011
Cloud computing entails a novel security threat: The cloud service provider is entrusted with the data of all its customers. This… 
2011
2011
As a result of the widespread use of social networking sites, millions of individuals can today easily share personal and… 
2009
2009
In this paper we propose a novel usage control policy specification based on Coloured Petri Nets formalism. Recently, usage… 
2008
2008
Though a user's privileges are often granted based on the tasks that the user is expected to fulfill, the concept of tasks is… 
2007
2007
Policies provide a flexible and scalable approach to the management of distributed systems by separating the specification of… 
2003
2003
Systematic development of security sensitive software requires that there be a sufficiently expressive linguistic extension to… 
1999
1999
In this paper we describe an alternative, flexible approach to multicast security in active networks. Traditional schemes for…