Sciweavers

1446 search results - page 40 / 290
» Network Access Control (NAC)
Sort
View
SACMAT
2010
ACM
13 years 9 months ago
An architecture for enforcing end-to-end access control over web applications
The web is now being used as a general platform for hosting distributed applications like wikis, bulletin board messaging systems and collaborative editing environments. Data from...
Boniface Hicks, Sandra Rueda, Dave King 0002, Thom...
MMMACNS
2005
Springer
14 years 4 months ago
A Modal Logic for Role-Based Access Control
Making correct access-control decisions is central to security, which in turn requires accounting correctly for the identity, credentials, roles, authority, and privileges of users...
Thumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Ch...
COMCOM
2008
138views more  COMCOM 2008»
13 years 11 months ago
Secure content access and replication in pure P2P networks
Despite the advantages offered by pure Peer-to-Peer (P2P) networks (e.g. robustness and fault tolerance), a crucial requirement is to guarantee basic security properties, such as ...
Esther Palomar, Juan M. Estévez-Tapiador, J...
ACISP
2003
Springer
14 years 4 months ago
A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems
Abstract. This paper examines the access control requirements of distributed health care information networks. Since the electronic sharing of an individual’s personal health inf...
Jason Reid, Ian Cheong, Matthew Henricksen, Jason ...
EUROMICRO
2002
IEEE
14 years 3 months ago
Customer Choice in a Multi-Service Residential Access Network Environment
TORRENT is an EU-Supported Framework 5 project that is showing how intelligent control and negotiation capabilities can be built into access networks so as to give the residential...
Eric Scharf, Peter Hamer, Konstantinos Smparounis,...