Sciweavers

670 search results - page 4 / 134
» A RBAC-Based Policy Information Base
Sort
View
FUIN
2008
93views more  FUIN 2008»
13 years 8 months ago
Logic-based Conflict Detection for Distributed Policies
Policies are used to describe rules that are employed to modify (often distributed) system behaviour at runtime. Typically policies are created by many different people and there a...
Carlo Montangero, Stephan Reiff-Marganiec, Laura S...
CSFW
2005
IEEE
14 years 2 months ago
Language-Based Information Erasure
Real computing systems sometimes need to forget sensitive information. This paper explores the specification and semantics of information erasure policies, which impose a strong,...
Stephen Chong, Andrew C. Myers
CIIT
2007
131views Communications» more  CIIT 2007»
13 years 10 months ago
Intra-federation credential negotiation based on individualized release strategy
In federated world like Shibboleth the release policy- how a member’s personal information to be divulged is set by their home organization. The member has little say in it. In ...
Javed I. Khan, Kailas B. Bobade, Manas Hardas
IPMU
2010
Springer
13 years 7 months ago
Keeping Secrets in Possibilistic Knowledge Bases with Necessity-Valued Privacy Policies
Controlled Query Evaluation (CQE) is a logical framework for the protection of secrets in databases. In this article, we extend the CQE framework to possibilistic logic: knowledge ...
Lena Wiese
EUROMICRO
2004
IEEE
14 years 15 days ago
A Framework for Protecting Web Sevices with IPsec
This paper proposes a WSDL extension for describing IPsec policies for protecting Web Services communications. By using the proposed extension, a Web Service (server) informs to i...
Cássio Ditzel Kropiwiec, Edgard Jamhour, Ca...