Sciweavers

1082 search results - page 26 / 217
» Policy support for call control
Sort
View
POLICY
2005
Springer
14 years 2 months ago
A RBAC-Based Policy Information Base
This paper presents a framework for representing and distributing access control policies in distributed heterogeneous systems. Access control polices follows the RBAC (Role Based...
Timothy E. Squair, Edgard Jamhour, Ricardo Nabhen
CMS
2006
164views Communications» more  CMS 2006»
13 years 10 months ago
Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains
In this paper we describe how we have added support for dynamic delegation of authority that is enacted via the issuing of credentials from one user to another, to the XACML model ...
David W. Chadwick, Sassa Otenko, Tuan-Anh Nguyen
CODASPY
2011
13 years 7 days ago
Relationship-based access control: protection model and policy language
Social Network Systems pioneer a paradigm of access control that is distinct from traditional approaches to access control. Gates coined the term Relationship-Based Access Control...
Philip W. L. Fong
CODES
2005
IEEE
14 years 2 months ago
Enhancing security through hardware-assisted run-time validation of program data properties
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
SP
2007
IEEE
183views Security Privacy» more  SP 2007»
14 years 2 months ago
Ciphertext-Policy Attribute-Based Encryption
In several distributed systems a user should only be able to access data if a user posses a certain set of credentials or attributes. Currently, the only method for enforcing such...
John Bethencourt, Amit Sahai, Brent Waters