Sciweavers

872 search results - page 32 / 175
» An Access Control Language for a General Provenance Model
Sort
View
CCS
2006
ACM
13 years 11 months ago
Safety analysis of usage control authorization models
The usage control (UCON) model was introduced as a unified approach to capture a number of extensions for traditional access control models. While the policy specification flexibi...
Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Pre...
IEEECIT
2010
IEEE
13 years 6 months ago
Enabling Privacy-preserving Credential-based Access Control with XACML and SAML
—In this paper we describe extensions to the access control industry standards XACML and SAML to enable privacy-preserving and credential-based access control. Rather than assumi...
Claudio Agostino Ardagna, Sabrina De Capitani di V...
CSFW
2006
IEEE
14 years 1 months ago
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies
There is a growing interest in establishing rules to regulate the privacy of citizens in the treatment of sensitive personal data such as medical and financial records. Such rule...
Michael J. May, Carl A. Gunter, Insup Lee
SACMAT
2006
ACM
14 years 1 months ago
Access control, confidentiality and privacy for video surveillance databases
In this paper we have addressed confidentiality and privacy for video surveillance databases. First we discussed our overall approach for suspicious event detection. Next we discu...
Bhavani M. Thuraisingham, Gal Lavee, Elisa Bertino...
INFOCOM
2000
IEEE
13 years 12 months ago
Power Controlled Multiple Access (PCMA) in Wireless Communication Networks
—We address the issue of power-controlled shared channel access in future wireless networks supporting packetized data traffic, beyond the voice-oriented continuous traffic prima...
Nicholas Bambos, Sunil Kandukuri