Sciweavers

353 search results - page 41 / 71
» A Policy Model for Secure Information Flow
Sort
View
CORR
2010
Springer
157views Education» more  CORR 2010»
13 years 7 months ago
Certification Authority Monitored Multilevel and Stateful Policy Based Authorization in Services Oriented Grids
Services oriented grids will be more prominent among other kinds of grids in the present distributed environments. With the advent of online government services the governmental g...
Ajay Prasad, Saurabh Singh Verma, Ashok Kumar Shar...
SACMAT
2003
ACM
14 years 28 days ago
Dependencies and separation of duty constraints in GTRBAC
A Generalized Temporal Role Based Access Control (GTRBAC) model that captures an exhaustive set of temporal constraint needs for access control has recently been proposed. GTRBAC...
James Joshi, Basit Shafiq, Arif Ghafoor, Elisa Ber...
CCS
2006
ACM
13 years 11 months ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch
SP
2007
IEEE
137views Security Privacy» more  SP 2007»
14 years 1 months ago
A Cryptographic Decentralized Label Model
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
Jeffrey A. Vaughan, Steve Zdancewic
RULEML
2005
Springer
14 years 1 months ago
A Semantic Web Framework for Interleaving Policy Reasoning and External Service Discovery
Enforcing rich policies in open environments will increasingly require the ability to dynamically identify external sources of information necessary to enforce different policies (...
Jinghai Rao, Norman M. Sadeh