Sciweavers

2655 search results - page 19 / 531
» Event Systems and Access Control
Sort
View
ACSAC
2000
IEEE
13 years 11 months ago
History-based Distributed Filtering - A Tagging Approach to Network-Level Access Control
This contribution discusses a network-level access control technique that applies the non-discretionary access control model to individual data packets that are exchanged between ...
Reiner Sailer, M. Kabatnik
AUSFORENSICS
2003
13 years 8 months ago
Design of a Network-Access Audit Log for Security Monitoring and Forensic Investigation
An attempt at determining the source of anomalous network traffic may result in the identification of the networked system where it originated. From a forensic point of view it is...
Atif Ahmad, Tobias Ruighaver
ICDIM
2010
IEEE
13 years 5 months ago
Risk management in dynamic role based access control systems
We present a risk management framework which allows to reason about and manage risk for role based access control systems. The framework expresses essential characteristics of risk...
Ji Ma, Kamel Adi, Luigi Logrippo, Serge Mankovski
MOBILWARE
2009
ACM
14 years 1 months ago
A Quality of Context-Aware Approach to Access Control in Pervasive Environments
Alessandra Toninelli, Antonio Corradi, Rebecca Mon...
COMGEO
2010
ACM
13 years 10 months ago
Access control systems for spatial data infrastructures and their administration
Today sophisticated concepts, languages and frameworks exist, that allow implementing powerful fine grained access control systems for protecting Web Services and spatial data in ...
Jan Herrmann