Sciweavers

374 search results - page 53 / 75
» Managing Delegation in Access Control Models
Sort
View
CCS
2008
ACM
13 years 9 months ago
Flexible and secure enterprise rights management based on trusted virtual domains
The requirements for secure document workflows in enterprises become increasingly sophisticated, with employees performing different tasks under different roles using the same pro...
Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, ...
AINA
2009
IEEE
14 years 2 months ago
Enabling Mobility between Context-Aware Smart Spaces
This paper presents “ConServ1 ”, a web service for context management. ConServ allows smart spaces to access user’s context data according to user-defined policies. This we...
Gearoid Hynes, Vinny Reynolds, Manfred Hauswirth
IANDC
2008
140views more  IANDC 2008»
13 years 7 months ago
Information flow security in Boundary Ambients
A variant of the Mobile Ambient calculus, called Boundary Ambients, is introduced, supporting the modelling of multi-level security policies. Ambients that may guarantee to proper...
Chiara Braghin, Agostino Cortesi, Riccardo Focardi
ICCSA
2009
Springer
14 years 2 months ago
MDA-Based Framework for Automatic Generation of Consistent Firewall ACLs with NAT
Abstract. The design and management of firewall ACLs is a very hard and error-prone task. Part of this complexity comes from the fact that each firewall platform has its own low-le...
Sergio Pozo, A. J. Varela-Vaca, Rafael M. Gasca
GIS
2008
ACM
13 years 8 months ago
Towards a scalable model for location privacy
With the growth of wireless and mobile technologies, we are witnessing an increase in location-based services (LBS). Although LBS provide enhanced functionalities, they open up ne...
Nayot Poolsappasit, Indrakshi Ray