Sciweavers

852 search results - page 90 / 171
» Model-Checking Access Control Policies
Sort
View
MONET
2006
145views more  MONET 2006»
13 years 9 months ago
Efficient Resource Allocation for Policy-Based Wireless/Wireline Interworking
Abstract This paper proposes efficient resource allocation techniques for a policy-based wireless/wireline interworking architecture, where quality of service (QoS) provisioning an...
Yu Cheng, Wei Song, Weihua Zhuang, Alberto Leon-Ga...
DASFAA
2007
IEEE
188views Database» more  DASFAA 2007»
14 years 3 months ago
Security-Conscious XML Indexing
To support secure exchanging and sharing of XML data over the Internet, a myriad of XML access control mechanisms have been proposed. In the setting of node-level fine-grained acc...
Yan Xiao, Bo Luo, Dongwon Lee
DEON
2008
Springer
13 years 10 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...
CSSE
2004
IEEE
13 years 8 months ago
AdOrBAC: an administration model for Or-BAC
Even though the final objective of an access control model is to provide a framework to decide if actions performed by subjects on objects are permitted or not, it is not convenie...
Frédéric Cuppens, Alexandre Mi&egrav...
IJNSEC
2007
139views more  IJNSEC 2007»
13 years 8 months ago
Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications
Large scale distributed applications combine network access with multiple storage and computational elements. The distributed responsibility for resource control creates new secur...
Sotiris Ioannidis, Steven M. Bellovin, John Ioanni...