Sciweavers

481 search results - page 34 / 97
» Analyzing and Managing Role-Based Access Control Policies
Sort
View
FLOPS
2006
Springer
14 years 14 days ago
Soutei, a Logic-Based Trust-Management System
We describe the design and implementation of a trust-management system Soutei, a dialect of Binder, for access control in distributed systems. Soutei policies and credentials are w...
Andrew Pimlott, Oleg Kiselyov
INFOCOM
2000
IEEE
14 years 1 months ago
Receiver Based Management of Low Bandwidth Access Links
Abstract—In this paper, we describe a receiver based congestion control policy that leverages TCP flow control mechanisms to prioritize mixed traffic loads across access links....
Neil T. Spring, Maureen Chesire, Mark Berryman, Vi...
NOMS
2000
IEEE
14 years 1 months ago
POWER prototype: towards integrated policy-based management
ot only high level description of abstract policy, but also enables such policy to be refined and eventually mapped into an appropriate configuration for controlling devices in the...
Marco Casassa Mont, Adrian Baldwin, Cheh Goh
HICSS
2006
IEEE
126views Biometrics» more  HICSS 2006»
14 years 2 months ago
A Model for Temporal Interval Authorizations
A new model for representing temporal access control policies is introduced. In this model, temporal authorizations are represented by time attributes associated with subjects and...
Francis B. Afinidad, Timothy E. Levin, Cynthia E. ...
DBSEC
2000
112views Database» more  DBSEC 2000»
13 years 10 months ago
Coordinating Policy for Federated Applications
Abstract At the start of its present term of office in 1997 the UK government published a planning document promising ubiquitous access to Electronic Health Records (EHRs) held wit...
Ken Moody