Sciweavers

706 search results - page 32 / 142
» Access Control: Policies, Models, and Mechanisms
Sort
View
CDC
2009
IEEE
123views Control Systems» more  CDC 2009»
14 years 9 days ago
On the myopic policy for a class of restless bandit problems with applications in dynamic multichannel access
We consider a class of restless multi-armed bandit problems that arises in multi-channel opportunistic communications, where channels are modeled as independent and stochastically...
Keqin Liu, Qing Zhao
ICISS
2005
Springer
14 years 1 months ago
Protection of Relationships in XML Documents with the XML-BB Model
Since XML tends to become the main format to exchange data over the Internet, it is necessary to define a security model to control the access to the content of these documents. S...
Frédéric Cuppens, Nora Cuppens-Boula...
SP
1987
IEEE
118views Security Privacy» more  SP 1987»
13 years 11 months ago
A Comparison of Commercial and Military Computer Security Policies
Most discussions of computer security focus on control of disclosure. In Particular, the U.S. Department of Defense has developed a set of criteria for computer mechanisms to prov...
D. D. Clark, D. R. Wilson
ENTCS
2007
112views more  ENTCS 2007»
13 years 7 months ago
A Holistic Approach to Security Policies - Policy Distribution with XACML over COPS
The potentials of modern information technology can only be exploited, if the underlying infrastructure and the applied applications sufficiently take into account all aspects of ...
Jan Peters, Roland Rieke, Taufiq Rochaeli, Bjö...
TISSEC
2010
121views more  TISSEC 2010»
13 years 6 months ago
Privacy-aware role-based access control
Privacy has been acknowledged to be a critical requirement for many business (and non-business) environments. Therefore, the definition of an expressive and easy-to-use privacyre...
Qun Ni, Elisa Bertino, Jorge Lobo, Carolyn Brodie,...