Sciweavers

353 search results - page 49 / 71
» A Policy Model for Secure Information Flow
Sort
View
NDSS
1997
IEEE
13 years 12 months ago
Hierarchical Organization of Certification Authorities for Secure Environments
This paper presents a model of hierarchical organization of Certification Authorities which can be applied to any open system network. In order to study the feasibility of the pro...
Lourdes López Santidrián, Justo Carr...
ICDE
2007
IEEE
131views Database» more  ICDE 2007»
14 years 2 months ago
Enhancing Secured Service Interoperability with Decentralized Orchestration
Several current research efforts in business process modeling are investigating XML-based executable formal specification languages. The availability of the latter allows modeled...
Ustun Yildiz, Claude Godart
CCS
2008
ACM
13 years 9 months ago
Flexible and secure enterprise rights management based on trusted virtual domains
The requirements for secure document workflows in enterprises become increasingly sophisticated, with employees performing different tasks under different roles using the same pro...
Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, ...
SACMAT
2009
ACM
14 years 2 months ago
Supporting RBAC with XACML+OWL
XACML does not natively support RBAC and even the specialized XACML profiles are not able to support many relevant constraints such as static and dynamic separation of duty. Exte...
Rodolfo Ferrini, Elisa Bertino
VEE
2010
ACM
291views Virtualization» more  VEE 2010»
14 years 2 months ago
Neon: system support for derived data management
Modern organizations face increasingly complex information management requirements. A combination of commercial needs, legal liability and regulatory imperatives has created a pat...
Qing Zhang, John McCullough, Justin Ma, Nabil Sche...