Sciweavers

630 search results - page 27 / 126
» Acceptable internet use policy
Sort
View
NSPW
2004
ACM
14 years 29 days ago
Support for multi-level security policies in DRM architectures
Digital rights management systems allow copyrighted content to be commercialized in digital format without the risk of revenue loss due to piracy. Making such systems secure is no...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
COMPSEC
2008
111views more  COMPSEC 2008»
13 years 7 months ago
An ontology-based policy for deploying secure SIP-based VoIP services
-- Voice services over Internet Protocol (VoIP) are nowadays much promoted by telecommunication and Internet service providers. However, the utilization of open networks, like the ...
Dimitris Geneiatakis, Costas Lambrinoudakis, Georg...
ICAIL
2011
ACM
12 years 7 months ago
Argument schemes for two-phase democratic deliberation
A formal two-phase model of democratic policy deliberation is presented, in which in the first phase sufficient and necessary criteria for proposals to be accepted are determine...
Trevor J. M. Bench-Capon, Henry Prakken, Wietske V...
NOMS
2000
IEEE
138views Communications» more  NOMS 2000»
13 years 12 months ago
Policy-based hybrid management architecture for IP-based VPN
Using IP-based Virtual Private Network (IP-VPN) technology, a company can establish its virtual private network over public networks. Recently, IP-VPN emerges as one of main techn...
Seung-Jin Baek, Moon-Sang Jeong, Jong-Tae Park, Ta...
SPW
2001
Springer
13 years 12 months ago
On the Negotiation of Access Control Policies
Although the notion of negotiation has been used extensively in secure communication protocols to establish common keying states, protocol modes and services, this notion is only n...
Virgil D. Gligor, Himanshu Khurana, Radostina K. K...