Sciweavers

534 search results - page 13 / 107
» Aggregating and Deploying Network Access Control Policies
Sort
View
SACMAT
2003
ACM
14 years 18 days ago
Dynamic access control: preserving safety and trust for network defense operations
We investigate the cost of changing access control policies dynamically as a response action in computer network defense. We compare and contrast the use of access lists and capab...
Prasad Naldurg, Roy H. Campbell
CORR
2010
Springer
133views Education» more  CORR 2010»
13 years 7 months ago
Access-Network Association Policies for Media Streaming in Heterogeneous Environments
Abstract--We study the design of media streaming applications in the presence of multiple heterogeneous wireless access methods with different throughputs and costs. Our objective ...
Ali ParandehGheibi, Muriel Médard, Asuman E...
POLICY
2007
Springer
14 years 1 months ago
XACML Function Annotations
XACML is being increasingly adopted in large enterprise systems for specifying access control policies. However, the efficient analysis and integration of multiple policies in suc...
Prathima Rao, Dan Lin, Elisa Bertino
ICC
2007
IEEE
155views Communications» more  ICC 2007»
14 years 1 months ago
Design of a Medium Access Control Protocol for Dynamic Spectrum Access Networks
Abstract - In this paper we present a design of a medium access control protocol that allows the utilization of unused licensed spectrum of deployed wireless cellular systems (Prim...
Amitabh Mishra, Dharma P. Agrawal
ISSTA
2006
ACM
14 years 1 months ago
Role-Based access control consistency validation
Modern enterprise systems support Role-Based Access Control (RBAC). Although RBAC allows restricting access to privileged operations, a deployer may actually intend to restrict ac...
Paolina Centonze, Gleb Naumovich, Stephen J. Fink,...