Sciweavers

670 search results - page 32 / 134
» A RBAC-Based Policy Information Base
Sort
View
WETICE
2005
IEEE
14 years 4 months ago
Trust Infrastructure for Policy based Messaging In Open Environments
Policy-based messaging (PBM) aims at carrying security policies with messages, which will be enforced at recipient systems to provide security features. PBM promotes a distributed...
Gansen Zhao, David W. Chadwick
ICC
2007
IEEE
14 years 5 months ago
Dynamic Lightpath Establishment for Service Differentiation Based on Optimal MDP Policy in All-Optical Networks with Wavelength
— In this paper, we propose a dynamic lightpath establishment method for service differentiation in all-optical WDM networks with the capability of full-range wavelength conversi...
Takuji Tachibana, Shoji Kasahara, Kenji Sugimoto
CCS
2006
ACM
14 years 2 months ago
Secure attribute-based systems
Attributes define, classify, or annotate the datum to which they are assigned. However, traditional attribute architectures and cryptosystems are ill-equipped to provide security ...
Matthew Pirretti, Patrick Traynor, Patrick McDanie...
PROMAS
2007
Springer
14 years 5 months ago
Modules as Policy-Based Intentions: Modular Agent Programming in GOAL
Modular programming has the usual benefits associated with structured programming, information hiding and reusability, but also has additional benefits to offer when applied in ...
Koen V. Hindriks
IASTEDSE
2004
14 years 6 days ago
An authorization and access control scheme for pervasive computing
The existence of a central security authority is too restrictive for pervasive computing environments. Existing distributed security schemes fail in a pervasive computing environm...
Linda Staffans, Titos Saridakis