Sciweavers

409 search results - page 8 / 82
» Flexible Scheduler-Independent Security
Sort
View
USENIX
2003
13 years 10 months ago
Secure and Flexible Global File Sharing
Trust management credentials directly authorize actions, rather than divide the authorization task into authentication and access control. Unlike traditional credentials, which bi...
Stefan Miltchev, Vassilis Prevelakis, Sotiris Ioan...
ACSW
2003
13 years 10 months ago
Flexible Enterprise Access Control with Object-oriented View Specification
The per-method access control lists of standard middleware technologies allow only simple forms of access control to be expressed and enforced. Given the increasing use of webbase...
Mark Evered
MANSCI
2007
70views more  MANSCI 2007»
13 years 8 months ago
Optimal Risk Taking with Flexible Income
We study the portfolio selection problem of an investor who can optimally exert costly effort for more income. The possibility of generating more income, if necessary, increases ...
Jaksa Cvitanic, Levon Goukasian, Fernando Zapatero
COMPSEC
2002
92views more  COMPSEC 2002»
13 years 8 months ago
A practical key management scheme for access control in a user hierarchy
In a user hierarchy we say that a security class is subordinate to another security class if the former has a lower security privilege than the latter. To implement such a hierarc...
Sheng Zhong