Sciweavers

882 search results - page 85 / 177
» On the Negotiation of Access Control Policies
Sort
View
JCP
2006
106views more  JCP 2006»
13 years 8 months ago
Using Firewalls to Enforce Enterprise-wide Policies over Standard Client-Server Interactions
We propose and evaluate a novel framework for enforcing global coordination and control policies over message passing software components in enterprise computing environments. This...
Tuan Phan, Zhijun He, Thu D. Nguyen
CORR
2006
Springer
126views Education» more  CORR 2006»
13 years 8 months ago
Power Control for User Cooperation
For a fading Gaussian multiple access channel with user cooperation, we obtain the optimal power allocation policies that maximize the rates achievable by block Markov superpositi...
Onur Kaya, Sennur Ulukus
SACMAT
2003
ACM
14 years 1 months ago
Dependencies and separation of duty constraints in GTRBAC
A Generalized Temporal Role Based Access Control (GTRBAC) model that captures an exhaustive set of temporal constraint needs for access control has recently been proposed. GTRBACā...
James Joshi, Basit Shafiq, Arif Ghafoor, Elisa Ber...
CSFW
2004
IEEE
13 years 12 months ago
Owned Policies for Information Security
In many systems, items of information have owners associated with them. An owner of an item of information may want the system to enforce a policy that restricts use of that infor...
Hubie Chen, Stephen Chong
EUROPKI
2005
Springer
14 years 1 months ago
A Heterogeneous Network Access Service Based on PERMIS and SAML
Abstract The expansion of inter-organizational scenarios based on different authorization schemes involves the development of integration solutions allowing diļ¬€erent authorizatio...
Gabriel López Millán, Óscar C...