Sciweavers

882 search results - page 100 / 177
» On the Negotiation of Access Control Policies
Sort
View
SP
2002
IEEE
200views Security Privacy» more  SP 2002»
13 years 7 months ago
Design of a Role-Based Trust-Management Framework
We introduce the RT framework, a family of Rolebased Trust-management languages for representing policies and credentials in distributed authorization. RT combines the strengths o...
Ninghui Li, John C. Mitchell, William H. Winsborou...
IEEEARES
2007
IEEE
14 years 2 months ago
CSP-Based Firewall Rule Set Diagnosis using Security Policies
The most important part of a firewall configuration process is the implementation of a security policy by a security administrator. However, this security policy is not designed b...
Sergio Pozo, Rafael Ceballos, Rafael M. Gasca
POLICY
2004
Springer
14 years 1 months ago
A Decentralized Treatment of a Highly Distributed Chinese-Wall Policy
Access control (AC) technology has come a long way from its roots as the means for sharing resources between processes running on a single machine, to a mechanism for regulating t...
Naftaly H. Minsky
POLICY
2001
Springer
14 years 15 days ago
The Ponder Policy Specification Language
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databas...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
ACSAC
1999
IEEE
14 years 11 days ago
A Prototype Secure Workflow Server
Workflow systems provide automated support that enables organizations to efficiently and reliably move important data through their routine business processes. For some organizati...
Douglas L. Long, Julie Baker, Francis Fung