Sciweavers

804 search results - page 53 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
POLICY
2007
Springer
15 years 10 months ago
Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall
We present a discretionary access control framework that can be used to control a principal’s ability to link information from two or more audit records and compromise a user’...
Apu Kapadia, Prasad Naldurg, Roy H. Campbell
POLICY
2009
Springer
15 years 11 months ago
In Vivo Evolution of Policies that Govern a Distributed System
This paper addresses an important open problem confronting any decentralized and stateful access control (AC) mechanism for networked systems, particularly when the system at hand...
Constantin Serban, Naftaly H. Minsky
SEC
2008
15 years 5 months ago
Negotiation of Prohibition: An Approach Based on Policy Rewriting
Abstract. In recent security architectures, it is possible that the security policy is not evaluated in a centralized way but requires negotiation between the subject who is reques...
Nora Cuppens-Boulahia, Frédéric Cupp...
CN
2004
84views more  CN 2004»
15 years 4 months ago
A parameter based admission control for differentiated services networks
The Differentiated Services architecture targets at providing scalable network Quality of Service by means of aggregate scheduling. However, the defined framework itself only give...
Markus Fidler, Volker Sander
ISQED
2009
IEEE
117views Hardware» more  ISQED 2009»
15 years 11 months ago
Adaptive voltage controlled nanoelectronic addressing for yield, accuracy and resolution
An outstanding challenge for realizing nanoelectronic systems is nano-interface design, i.e., how to precisely access a nanoscale wire in an array for communication between a nano...
Bao Liu