Sciweavers

1627 search results - page 3 / 326
» On context in authorization policy
Sort
View
IEEEARES
2008
IEEE
14 years 1 months ago
Context Ontology for Secure Interoperability
During interoperability exchanges, organizations are jointly conducting computation and sharing tasks. However, organizations can have different security policies. To guarantee g...
Céline Coma, Nora Cuppens-Boulahia, Fr&eacu...
CSFW
2008
IEEE
14 years 1 months ago
Evidence-Based Audit
Authorization logics provide a principled and flexible approach to specifying access control policies. One of their compelling benefits is that a proof in the logic is evidence ...
Jeffrey A. Vaughan, Limin Jia, Karl Mazurak, Steve...
CORR
2010
Springer
157views Education» more  CORR 2010»
13 years 7 months ago
Certification Authority Monitored Multilevel and Stateful Policy Based Authorization in Services Oriented Grids
Services oriented grids will be more prominent among other kinds of grids in the present distributed environments. With the advent of online government services the governmental g...
Ajay Prasad, Saurabh Singh Verma, Ashok Kumar Shar...
SOUPS
2010
ACM
13 years 11 months ago
Optimizing a policy authoring framework for security and privacy policies
Policies which address security and privacy are pervasive parts of both technical and social systems, and technology to enable both organizations and individuals to create and man...
Maritza Johnson, John Karat, Clare-Marie Karat, Ke...
COMCOM
2008
71views more  COMCOM 2008»
13 years 7 months ago
The policy continuum-Policy authoring and conflict analysis
Steven Davy, Brendan Jennings, John Strassner