Sciweavers

762 search results - page 108 / 153
» Modeling and Simulating Information Security Management
Sort
View
SACMAT
2011
ACM
12 years 10 months ago
xDAuth: a scalable and lightweight framework for cross domain access control and delegation
Cross domain resource sharing and collaborations have become pervasive in today’s service oriented organizations. Existing approaches for the realization of cross domain access ...
Masoom Alam, Xinwen Zhang, Kamran Khan, Gohar Ali
SACMAT
2009
ACM
14 years 2 months ago
Ensuring spatio-temporal access control for real-world applications
Traditional access control models, such as Role-Based Access Control (RBAC), do not take into account contextual information, such as location and time, for making access decision...
Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anas...
WPES
2003
ACM
14 years 29 days ago
Anonymous credentials with biometrically-enforced non-transferability
We present a model and protocol for anonymous credentials. Rather than using deterrents to ensure non-transferability, our model uses secure hardware with biometric authentication...
Russell Impagliazzo, Sara Miner More
DIM
2006
ACM
14 years 1 months ago
Privacy preserving multi-factor authentication with biometrics
An emerging approach to the problem of reducing the identity theft is represented by the adoption of biometric authentication systems. Such systems however present however several...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
WSC
2000
13 years 9 months ago
Circumstance descriptors: a method for generating plan modifications and fragmentary orders
Circumstance Descriptors are offered as a way to organize spatial and other military knowledge that may be difficult to formulate, particularly the kinds of details that are most ...
John B. Gilmer Jr.