Sciweavers

882 search results - page 8 / 177
» On the Negotiation of Access Control Policies
Sort
View
ACSAC
2008
IEEE
13 years 10 months ago
Assessing Quality of Policy Properties in Verification of Access Control Policies
Access control policies are often specified in declarative languages. In this paper, we propose a novel approach, called mutation verification, to assess the quality of properties...
Evan Martin, JeeHyun Hwang, Tao Xie, Vincent C. Hu
WPES
2003
ACM
14 years 1 months ago
Hidden Credentials
Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend o...
Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons...
AUSAI
2004
Springer
14 years 1 months ago
A Logic Based Approach for Dynamic Access Control
The PolicyUpdater1 system is a fully-implemented access control system that provides policy evaluations as well as dynamic policy updates. These functions are achieved by the use o...
Vino Fernando Crescini, Yan Zhang
EUC
2005
Springer
14 years 1 months ago
Access Policy Sheet for Access Control in Fine-Grained XML
Abstract. We propose an access control scheme for developing authorization rules for XML documents, allowing flexible data granularity and authorization propagation. To simplify t...
Jing Wu, Yi Mu, Jennifer Seberry, Chun Ruan
DEXA
2003
Springer
134views Database» more  DEXA 2003»
14 years 1 months ago
Concurrent and Real-Time Update of Access Control Policies
Abstract. Access control policies are security policies that govern access to resources. Real-time update of access control policies, that is, updating policies while they are in e...
Indrakshi Ray, Tai Xin