Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications by: Vincent C. Hu (Fed)

Search Title, Abstract, Conference, Citation, Keyword or Author
Displaying 26 - 37 of 37

Model Checking for Verification of Mandatory Access Control Models and Properties

February 28, 2011
Author(s)
Chung Tong Hu, David R. Kuhn, Tao Xie, J Hwang
Mandatory access control (MAC) mechanisms control which users or processes have access to which resources in a system. MAC policies are increasingly specified to facilitate managing and maintaining access control. However, the correct specification of the

Property Verification for Generic Access Control Models

December 20, 2008
Author(s)
Chung Tong Hu, David R. Kuhn, Tao Xie
To formally and precisely capture the security properties that access control should adhere to, access control models are usually written to bridge the rather wide gap in abstraction between policies and mechanisms. In this paper, we propose a new general

Decentralized Trust Domain Management in Multiple Grid Environments

November 25, 2007
Author(s)
Chung Tong Hu, Karen A. Scarfone, David F. Ferraiolo
Trust domain management for the global access of a grid is managed under centralized schema for most of the current grid architectures, which are designed based on the concept that there is only one grid for every grid member, therefore requiring central

Conformance Checking of Access Control Policies Specified in XACML

July 24, 2007
Author(s)
Vincent C. Hu, Evan Martin, Tao Xie
Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to which resources in a system. To facilitate managing and maintaining access

Access Control Policy Combinations for the Grid Using the Policy Machine

May 14, 2007
Author(s)
Vincent C. Hu, David F. Ferraiolo, Karen A. Scarfone
Many researchers have tackled the architecture and requirements aspects of grid security, concentrating on the authentication or authorization mediation instead of authorization techniques, especially the topic of policy combination. Policy combination is

Assessment of Access Control Systems

September 29, 2006
Author(s)
Chung Tong Hu, David F. Ferraiolo, David R. Kuhn
Access control is perhaps the most basic aspect of computer security. Nearly all applications that deal with financial, privacy, safety, or defense include some form of access control. In many systems access control takes the form of a simple password

An Overview of Issues in Testing Intrusion Detection Systems

July 11, 2003
Author(s)
Peter M. Mell, R Lippmann, Chung Tong Hu, J Haines, M Zissman
While intrusion detection systems are becoming ubiquitous defenses in today's networks, currently we have no comprehensive and scientifically rigorous methodology to test the effectiveness of these systems. This paper explores the types of performance

The Policy Machine for Security Policy Management

July 17, 2001
Author(s)
Chung Tong Hu, Deborah A. Frincke, David F. Ferraiolo
Many different access controls policies and models have been developed to suit a variety of goals: these include Role-Based Access Control, One-directional Information Flow, Chinese Wall, Clark-Wilson, N-person Control, and DAC, in addition to more

Introduction to Public Key Technology and the Federal PKI Infrastructure

February 26, 2001
Author(s)
D. Richard Kuhn, Vincent C. Hu, William Polk, Shu-jen H. Chang
This publication was developed to assist agency decision-makers in determining if a PKI is appropriate for their agency, and how PKI services can be deployed most effectively within a Federal agency. It is intended to provide an overview of PKI functions