Sciweavers

979 search results - page 51 / 196
» Developing Dynamic Security Policies
Sort
View
ICDE
2007
IEEE
164views Database» more  ICDE 2007»
14 years 4 months ago
Multi-session Separation of Duties (MSoD) for RBAC
Separation of duties (SoD) is a key security requirement for many business and information systems. Role Based Access Controls (RBAC) is a relatively new paradigm for protecting i...
David W. Chadwick, Wensheng Xu, Sassa Otenko, Roma...
CSFW
2010
IEEE
14 years 1 months ago
Towards Quantitative Analysis of Proofs of Authorization: Applications, Framework, and Techniques
—Although policy compliance testing is generally treated as a binary decision problem, the evidence gathered during the trust management process can actually be used to examine t...
Adam J. Lee, Ting Yu
IEEEARES
2007
IEEE
14 years 4 months ago
Formalising Dynamic Trust Negotiations in Decentralised Collaborative e-Health Systems
Access control in decentralised collaborative systems present huge challenges especially where many autonomous entities including organisations, humans, software agents from diff...
Oluwafemi Ajayi, Richard O. Sinnott, Anthony Stell
SIGMETRICS
2000
ACM
125views Hardware» more  SIGMETRICS 2000»
13 years 9 months ago
Resource management policies for e-commerce servers
Quality of service of e-commerce sites has been usually managed by the allocation of resources such as processors, disks, and network bandwidth, and by tracking conventional perfo...
Daniel A. Menascé, Rodrigo C. Fonseca, Virg...
GI
2003
Springer
14 years 3 months ago
Policy Based Management for Critical Infrastructure Protection
: Our current societies are fully dependent on large complex critical infrastructures (LCCIs). These LCCIs are large scale distributed systems that are highly interdependent, both ...
Gwendal Le Grand, Franck Springinsfeld, Michel Rig...