Sciweavers

882 search results - page 99 / 177
» On the Negotiation of Access Control Policies
Sort
View
IJCMAM
2010
160views more  IJCMAM 2010»
13 years 5 months ago
Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records
Commercial Web-based Personal-Health Record (PHR) systems can help patients to share their personal health records (PHRs) anytime from anywhere. PHRs are very sensitive data and an...
Luan Ibraimi, Qiang Tang, Pieter H. Hartel, Willem...
WWW
2010
ACM
14 years 3 months ago
Alhambra: a system for creating, enforcing, and testing browser security policies
Alhambra is a browser-based system designed to enforce and test web browser security policies. At the core of Alhambra is a policyenhanced browser supporting fine-grain security ...
Shuo Tang, Chris Grier, Onur Aciiçmez, Samu...
COMCOM
2008
138views more  COMCOM 2008»
13 years 8 months ago
Secure content access and replication in pure P2P networks
Despite the advantages offered by pure Peer-to-Peer (P2P) networks (e.g. robustness and fault tolerance), a crucial requirement is to guarantee basic security properties, such as ...
Esther Palomar, Juan M. Estévez-Tapiador, J...
CORR
2010
Springer
57views Education» more  CORR 2010»
13 years 8 months ago
A Repeated Game Formulation of Energy-Efficient Decentralized Power Control
Decentralized multiple access channels where each transmitter wants to selfishly maximize his transmission energyefficiency are considered. Transmitters are assumed to choose freel...
Mael Le Treust, Samson Lasaulce
DIMVA
2009
13 years 9 months ago
A Service Dependency Modeling Framework for Policy-Based Response Enforcement
The use of dynamic access control policies for threat response adapts local response decisions to high level system constraints. However, security policies are often carefully tigh...
Nizar Kheir, Hervé Debar, Fréd&eacut...