Sciweavers

804 search results - page 22 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
INFOCOM
2009
IEEE
15 years 11 months ago
Failure Control in Multipath Route Tracing
—Traceroute is widely used to report the path packets take between two internet hosts, but the widespread deployment of load balancing routers breaks a basic assumption – that ...
Darryl Veitch, Brice Augustin, Renata Teixeira, Ti...
AIIA
2005
Springer
15 years 6 months ago
Argumentation for Access Control
In this paper we are interested in argument based reasoning for access control, for example in the context of agents negotiating access to resources or web services in virtual orga...
Guido Boella, Joris Hulstijn, Leendert W. N. van d...
DBSEC
2010
162views Database» more  DBSEC 2010»
15 years 5 months ago
Distributed and Secure Access Control in P2P Databases
The intent of peer data management systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to...
Angela Bonifati, Ruilin Liu, Hui (Wendy) Wang
ARESEC
2011
145views more  ARESEC 2011»
14 years 4 months ago
An Attribute Based Framework for Risk-Adaptive Access Control Models
—The concept of risk-based adaptive access control (RAdAC, pronounced Raid-ack) has been recently introduced in the literature. It seeks to automatically (or semi-automatically) ...
Savith Kandala, Ravi S. Sandhu, Venkata Bhamidipat...
ICDCIT
2004
Springer
15 years 9 months ago
Using Schemas to Simplify Access Control for XML Documents
Abstract. Organizations are increasingly using the the eXtensible Markup Language (XML) for document representation and exchange on the Web. To protect an XML document from unautho...
Indrakshi Ray, Marianna Muller