Sciweavers

351 search results - page 20 / 71
» Formalisation and implementation of Access control models
Sort
View
ICNP
2005
IEEE
15 years 9 months ago
CONNET: Self-Controlled Access Links for Delay and Jitter Requirements
Access links are typically the bottleneck between a high bandwidth LAN and a high bandwidth IP network. Without a priori resource provisioning or reservation, this tends to have a...
Mohamed A. El-Gendy, Kang G. Shin, Hosam Fathy
ICDCS
2002
IEEE
15 years 8 months ago
dRBAC: Distributed Role-based Access Control for Dynamic Coalition Environments
Distributed Role-Based Access Control (dRBAC) is a scalable, decentralized trust-management and accesscontrol mechanism for systems that span multiple administrative domains. dRBA...
Eric Freudenthal, Tracy Pesin, Lawrence Port, Edwa...
WETICE
1998
IEEE
15 years 7 months ago
Authorization and Attribute Certificates for Widely Distributed Access Control
We describe a system whose purpose is to explore the use of certificates for the distributed management of access rights for resources that have multiple, independent, and geograp...
William E. Johnston, Srilekha Mudumbai, Mary R. Th...
117
Voted
PODS
2005
ACM
119views Database» more  PODS 2005»
16 years 3 months ago
Security analysis of cryptographically controlled access to XML documents
Some promising recent schemes for XML access control employ encryption for implementing security policies on published data, avoiding data duplication. In this paper we study one ...
Bogdan Warinschi, Martín Abadi
ACSAC
2000
IEEE
15 years 7 months ago
A Flexible Access Control Service for Java Mobile Code
Mobile Code (MC) technologies provide appealing solutionsfor the development of Internet applications.For instance, Java technologyfacilitates dynamic loading of application code ...
Antonio Corradi, Rebecca Montanari, Cesare Stefane...