Controlled Functional Encryption

Controlled Functional Encryption,
Muhammad Naveed, Shashank Agrawal, Manoj Prabhakaran, Xiaofeng Wang, Erman Ayday, Jean-Pierre Hubaux, and Carl A. Gunter.
ACM Computer and Communication Security (CCS), Scottsdale AZ, November 2014.

Last updated on Monday, September 29, 2014, 9:38 pm

MyABDAC: Compiling XACML Policies for Attribute-Based Database Access Control

MyABDAC: Compiling XACML Policies for Attribute-Based Database Access Control
Sonia Jahid, Carl A. Gunter, Imranul Hoque and Hamed Okhravi 
ACM Conference on Data and Application Security and Privacy, San Antonio, TX, February 2011. [BIB]

Last updated on Thursday, June 26, 2014, 1:01 pm

Attribute-Based Messaging: Access Control and Confidentiality

Attribute-Based Messaging: Access Control and Confidentiality
Rakesh Bobba, Omid Fatemieh, Fariba Khan, Arindam Khan, Carl A. Gunter, Himanshu Khurana and Manoj Prabhakaran
ACM Transactions on Information and Systems Security (TISSEC), volume 13, number 4, December 2010.

Last updated on Thursday, June 26, 2014, 12:33 pm

A Medical Database Case Study for Reflective Databases Access Control

A Medical Database Case Study for Reflective Databases Access Control
Lars Olson, Carl A. Gunter and Sarah Peterson Olson
Security and Privacy in Medical and Homecare Systems (SPIMACS ’09), Chicago, IL, November 2009. [PPT]

Last updated on Thursday, June 26, 2014, 1:00 pm

Reflective Database Access Control

Reflective Database Access Control
Lars E. Olson
Doctoral Thesis, University of Illinois at Urbana-Champaign, October 2009. [PPT]

Last updated on Thursday, June 26, 2014, 12:59 pm

Sh@re: Negotiated Audit in Social Networks

Sh@re: Negotiated Audit in Social Networks
Alejandro Gutierrez, Apeksha Godiyal, Matt Stockton, Michael LeMay, Carl A. Gunter and Roy H. Campbell
IEEE International Conference on Systems, Man, and Cybernetics (SMC ’09), San Antonio, TX, October 2009.

Last updated on Thursday, June 26, 2014, 12:59 pm

Implementing Reflective Access Control in SQL

Implementing Reflective Access Control in SQL
Lars E. Olson, Carl A. Gunter, William R. Cook and Marianne Winslett
23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec ’09), Montreal, QC, July 2009. [PPT]

Last updated on Tuesday, October 18, 2011, 2:44 pm

Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers

Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers
Carl A. Gunter
IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY ’09), London, UK, July 2009. [PPT][Related]

Last updated on Thursday, November 24, 2011, 7:01 pm

How to Bootstrap Security for Ad-Hoc Networks: Revisited

How to Bootstrap Security for Ad-Hoc Networks: Revisited
Wook Shin, Carl A. Gunter, Shinsaku Kiyomoto, Kazuhide Fukushima and Toshiaki Tanaka
IFIP Information Security Conference (SEC ’09), Pafos, Cyprus, May 2009.

Last updated on Monday, July 25, 2011, 4:19 pm

PBES: A Policy Based Encryption System with Application to Data Sharing in the Power Grid

PBES: A Policy Based Encryption System with Application to Data Sharing in the Power Grid
Rakeshbabu Bobba, Himanshu Khurana, Musab AlTurki, and Farhana Ashraf
ACM Symposium on Information, Computer and Communication Security (ASIACCS ’09), Sydney Australia, March 2009. [Related]

Last updated on Thursday, November 24, 2011, 6:59 pm