Fine-Grained Access Control-Enabled Logging Method on ARM TrustZone
نویسندگان
چکیده
منابع مشابه
On Fine-Grained Access Control for XML
Fine-grained access control for XML is about controlling access to XML documents at the granularity of individual elements or attributes. This thesis addresses two problems related to XML access controls. The first is efficient, secure evaluation of XPath expressions. We present a technique that secures path expressions by means of query modification, and we show that the query modification alg...
متن کاملFine-grained integration of access control policies
Collaborative and distributed applications, such as dynamic coalitions and virtualized grid computing, often require integrating access control policies of collaborating parties. Such an integration must be able to support complex authorization specifications and the finegrained integration requirements that the various parties may have. In this paper, we introduce an algebra for fine-grained i...
متن کاملFine-grained Access Control for Mobile Platforms
With the introduction of the smartphone, mobile phones have gone from closed systems with limited capability to mobile software platforms with rich software ecosystems. The same operating systems are now present in other mobile devices as well, such as tablets. The security mechanism of such software platforms have, apart from end-user requirements, heavily been influenced by business and legis...
متن کاملSeCloak: ARM Trustzone-based Mobile Peripheral Control
Reliable on-off control of peripherals on smart devices is a key to security and privacy in many scenarios. Journalists want to reliably turn off radios to protect their sources during investigative reporting. Users wish to ensure cameras and microphones are reliably off during private meetings. In this paper, we present SeCloak, an ARM TrustZone-based solution that ensures reliable on-off cont...
متن کاملA Fine Grained Access Control Model Based on Diverse Attributes
As the web has become a place for sharing of information and resources across varied domains, there is a need for providing authorization services in addition to authentication services provided by public key infrastructure (PKI). In distributed systems the use of attribute certificates (AC) has been explored as a solution for implementation of authorization services and their use is gaining po...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2020
ISSN: 2169-3536
DOI: 10.1109/access.2020.2991431