Sciweavers

882 search results - page 127 / 177
» On the Negotiation of Access Control Policies
Sort
View
DISCEX
2003
IEEE
14 years 1 months ago
Integrated Security Services for Dynamic Coalitions
Coalitions are collaborative networks of autonomous domains where resource sharing is achieved by the distribution of access permissions to coalition members based on negotiated r...
Himanshu Khurana, Serban I. Gavrila, Rakeshbabu Bo...
ECIS
2001
13 years 9 months ago
Towards sustainable quality of service in interconnection agreements: Implications from information asymmetry
This paper analyses the structure of the Internet marketplace and the business relationships of key players involved in network services provision. A brief overview of existing pr...
Ioanna D. Constantiou, Nikolaos A. Mylonopoulos
CCS
2010
ACM
13 years 7 months ago
A control point for reducing root abuse of file-system privileges
We address the problem of restricting root’s ability to change arbitrary files on disk, in order to prevent abuse on most current desktop operating systems. The approach first...
Glenn Wurster, Paul C. van Oorschot
PERVASIVE
2007
Springer
14 years 2 months ago
Virtual Walls: Protecting Digital Privacy in Pervasive Environments
As pervasive environments become more commonplace, the privacy of users is placed at increased risk. The numerous and diverse sensors in these environments can record users’ cont...
Apu Kapadia, Tristan Henderson, Jeffrey J. Fieldin...
ACSAC
2007
IEEE
14 years 2 months ago
Fine-Grained Information Flow Analysis and Enforcement in a Java Virtual Machine
We have implemented an information flow framework for the Java Virtual Machine that combines static and dynamic techniques to capture not only explicit flows, but also implicit ...
Deepak Chandra, Michael Franz