Sciweavers

804 search results - page 108 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
130
Voted
NETWORK
2007
145views more  NETWORK 2007»
15 years 4 months ago
Analysis of Shared Memory Priority Queues with Two Discard Levels
— Two rate SLAs become increasingly popular in today’s Internet, allowing a customer to save money by paying one price for committed traffic and a much lower price for additio...
Shlomi Bergida, Yuval Shavitt
ICIP
2004
IEEE
16 years 6 months ago
Security evaluation for communication-friendly encryption of multimedia
This paper addresses the access control issues unique to multimedia, by using a joint signal processing and cryptographic approach to multimedia encryption. Based on three atomic ...
Yinian Mao, Min Wu
LATA
2010
Springer
15 years 11 months ago
Using Sums-of-Products for Non-standard Reasoning
Abstract. An important portion of the current research in Description Logics is devoted to the expansion of the reasoning services and the developement of algorithms that can adequ...
Rafael Peñaloza
IEEEARES
2008
IEEE
15 years 11 months ago
Static Validation of Licence Conformance Policies
Policy conformance is a security property gaining importance due to commercial interest like Digital Rights Management. It is well known that static analysis can be used to valida...
René Rydhof Hansen, Flemming Nielson, Hanne...
ICC
2007
IEEE
15 years 11 months ago
Framework for Agent-Based Role Delegation
— This paper describes a framework for addressing the administration of role delegation introduced in the wellknown role-based access control model (RBAC). More specifically, thi...
Ezedin Barka, Ravi S. Sandhu