Sciweavers

882 search results - page 12 / 177
» On the Negotiation of Access Control Policies
Sort
View
ICDE
2003
IEEE
162views Database» more  ICDE 2003»
14 years 9 months ago
Dynamic Access Control Framework Based On Events
Access Control policies in e-commerce domain can be quite complex, affecting the response time provided to the users. We describe an event-based access control system that can pot...
Manish Bhide, Sandeep Pandey, Ajay Gupta 0004, Muk...
SIS
2008
13 years 9 months ago
Network Access Control Interoperation using Semantic Web Techniques
Network Access Control requirements are typically implemented in practice as a series of heterogeneous security-mechanism-centric policies that span system services and application...
William M. Fitzgerald, Simon N. Foley, Mích...
STTT
2008
134views more  STTT 2008»
13 years 7 months ago
Automated verification of access control policies using a SAT solver
Abstract. Managing access control policies in modern computer systems can be challenging and error-prone. Combining multiple disparate access policies can introduce unintended cons...
Graham Hughes, Tevfik Bultan
ICCS
2001
Springer
14 years 10 days ago
The Policy Machine for Security Policy Management
Abstract. Many different access control policies and models have been developed to suit a variety of goals; these include Role-Based Access Control, One-directional Information Flo...
Vincent C. Hu, Deborah A. Frincke, David F. Ferrai...
SOCA
2007
IEEE
14 years 2 months ago
Negotiating Agreements Using Policies in Ubiquitous Computing Scenarios
The emerging ubiquitous computing vision is characterized by decentralized and ad hoc interoperation among devices and networks for access to services. Interacting devices or grou...
Venkatraman Ramakrishna, Kevin Eustice, Peter L. R...