Sciweavers

882 search results - page 130 / 177
» On the Negotiation of Access Control Policies
Sort
View
MM
2004
ACM
106views Multimedia» more  MM 2004»
14 years 1 months ago
SMARXO: towards secured multimedia applications by adopting RBAC, XML and object-relational database
In this paper, a framework named SMARXO is proposed to address the security issues in multimedia applications by adopting RBAC (Role-Based Access Control), XML, and ObjectRelation...
Shu-Ching Chen, Mei-Ling Shyu, Na Zhao
TGC
2005
Springer
14 years 1 months ago
Types for Security in a Mobile World
Our society is increasingly moving towards richer forms of information exchange where mobility of processes and devices plays a prominent role. This tendency has prompted the acade...
Adriana B. Compagnoni, Elsa L. Gunter
SACMAT
2009
ACM
14 years 2 months ago
Towards formal security analysis of GTRBAC using timed automata
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri
NOSSDAV
2005
Springer
14 years 1 months ago
Interactive media server with media synchronized RAID storage system
We propose an efficient placement algorithm and per-disk prefetching method to effectively support interactive operations in the media server. Our placement policy is incorporate...
Seung Ho Lim, Yo-Won Jeong, Kyu Ho Park
CCS
2000
ACM
14 years 9 days ago
Implementing a distributed firewall
Conventional firewalls rely on topology restrictions and controlled network entry points to enforce traffic filtering. Furthermore, a firewall cannot filter traffic it does ...
Sotiris Ioannidis, Angelos D. Keromytis, Steven M....