Sciweavers

804 search results - page 31 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
CASSIS
2005
Springer
15 years 9 months ago
The Architecture of a Privacy-Aware Access Control Decision Component
Today many interactions are carried out online through Web sites and e-services and often private and/or sensitive information is required by service providers. A growing concern r...
Claudio Agostino Ardagna, Marco Cremonini, Ernesto...
IFIP
2004
Springer
15 years 9 months ago
A Formal Approach to Specify and Deploy a Network Security Policy
Current firewall configuration languages have no well founded semantics. Each firewall implements its own algorithm that parses specific proprietary languages. The main conseq...
Frédéric Cuppens, Nora Cuppens-Boula...
INFOCOM
2005
IEEE
15 years 10 months ago
rDCF: a relay-enabled medium access control protocol for wireless ad hoc networks
—It is well known that IEEE 802.11 provides a physical layer multirate capability and, hence, MAC layer mechanisms are needed to exploit this capability. Several solutions have b...
Hao Zhu, Guohong Cao
CCS
2005
ACM
15 years 9 months ago
A framework for concrete reputation-systems with applications to history-based access control
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions...
Karl Krukow, Mogens Nielsen, Vladimiro Sassone
AUTOMATICA
2006
106views more  AUTOMATICA 2006»
15 years 4 months ago
Decentralized receding horizon control for large scale dynamically decoupled systems
A detailed study on the design of decentralized Receding Horizon Control (RHC) schemes for decoupled systems is presented. An optimal control problem is formulated for a set of de...
Tamás Keviczky, Francesco Borrelli, Gary J....