Sciweavers

427 search results - page 13 / 86
» Implementing Real-Time Update of Access Control Policies
Sort
View
DISCEX
2003
IEEE
14 years 27 days ago
Dynamic Authorization and Intrusion Response in Distributed Systems
This paper¢ presents an authorization framework for supporting fine-grained access control policies enhanced with light-weight intrusion/misuse detectors and response capabiliti...
Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim
SACMAT
2009
ACM
14 years 2 months ago
Access control policy combining: theory meets practice
Many access control policy languages, e.g., XACML, allow a policy to contain multiple sub-policies, and the result of the policy on a request is determined by combining the result...
Ninghui Li, Qihua Wang, Wahbeh H. Qardaji, Elisa B...
ACSAC
2000
IEEE
14 years 15 hour ago
Implementing Security Policies using the Safe Areas of Computation Approach
The World Wide Web is playing a major role in reducing business costs and in providing convenience to users. Digital Libraries capitalize on this technology to distribute document...
André L. M. dos Santos, Richard A. Kemmerer
IEEEARES
2010
IEEE
14 years 2 months ago
Strategies for Reducing Risks of Inconsistencies in Access Control Policies
—Managing access control policies is a complex task. We argue that much of the complexity is unnecessary and mostly due to historical reasons. There are number of legacy policy s...
Bernard Stepien, Stan Matwin, Amy P. Felty
ICDCIT
2004
Springer
14 years 29 days ago
Automatic Enforcement of Access Control Policies Among Dynamic Coalitions
The need to securely share information on an ad-hoc basis between collaborating entities is increasingly becoming important. We propose a coalition based access control model (CBAC...
Vijayalakshmi Atluri, Janice Warner