Sciweavers

670 search results - page 53 / 134
» A RBAC-Based Policy Information Base
Sort
View
WORDS
2005
IEEE
14 years 4 months ago
An RBAC Framework for Time Constrained Secure Interoperation in Multi-domain Environments
In emerging e-commerce applications, time constrained information sharing between different systems is becoming a common phenomenon. A flexible and efficient mechanism is needed t...
Smithi Piromruen, James B. D. Joshi
ACSAC
2000
IEEE
14 years 3 months ago
Layering Boundary Protections: An Experiment in Information Assurance
The DARPA Information Assurance Program has the aim of developing and executing experiments that test specific hypotheses about defense in depth and dynamic defense capabilities. ...
D. Johnson, L. Benzinger
CSFW
2007
IEEE
14 years 5 months ago
Dynamic Dependency Monitoring to Secure Information Flow
Although static systems for information flow security are well-studied, few works address run-time information flow monitoring. Run-time information flow control offers distinc...
Paritosh Shroff, Scott F. Smith, Mark Thober
NETWORKING
2004
14 years 4 days ago
Hierarchical Routing with QoS Constraints in Optical Transport Networks
Abstract. Optical Transport Networks (OTN) with automatical switching capabilities are named ASON. Hierarchical routing is required in the ASON recommendations to achieve scalabili...
Xavier Masip-Bruin, Sergio Sánchez-Ló...
SACMAT
2010
ACM
13 years 9 months ago
Enforcing spatial constraints for mobile RBAC systems
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the administrative and security advantages of RBAC with the dynamic nature of mobile and...
Michael S. Kirkpatrick, Elisa Bertino