Sciweavers

769 search results - page 37 / 154
» Policy Storage for Role-Based Access Control Systems
Sort
View
JHSN
2006
267views more  JHSN 2006»
13 years 8 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...
DBSEC
2008
107views Database» more  DBSEC 2008»
13 years 10 months ago
Regulating Exceptions in Healthcare Using Policy Spaces
One truth holds for the healthcare industry - nothing should interfere with the delivery of care. Given this fact, the access control mechanisms used in healthcare to regulate and ...
Claudio Agostino Ardagna, Sabrina De Capitani di V...
DKE
2002
118views more  DKE 2002»
13 years 8 months ago
Consistent policy enforcement in distributed systems using mobile policies
This paper briefly traces the evolution of information system architectures from mainframe-connected terminals to distributed multi-tier architectures. It presents the challenges ...
Susan Chapin, Donald B. Faatz, Sushil Jajodia, Amg...
ESORICS
2007
Springer
14 years 3 months ago
What, Indeed, Is Intransitive Noninterference?
Abstract. This paper argues that Haigh and Young’s definition of noninterference for intransitive security policies admits information flows that are not in accordance with the...
Ron van der Meyden
TMM
2002
133views more  TMM 2002»
13 years 8 months ago
A model for secure multimedia document database system in a distributed environment
Abstract--The Internet provides a universal platform for largescale distribution of information and supports inter-organizational services, system integration, and collaboration. U...
James B. D. Joshi, Zhaohui Kevin Li, Husni Fahmi, ...