Sciweavers

806 search results - page 11 / 162
» Privacy Policy Referencing
Sort
View
77
Voted
CCS
2007
ACM
15 years 9 months ago
Weaving rewrite-based access control policies
Anderson Santana de Oliveira, Eric Ke Wang, Claude...
85
Voted
CCS
2007
ACM
15 years 9 months ago
Security policy compliance with violation management
Julien Brunel, Frédéric Cuppens, Nor...
65
Voted
CCS
2007
ACM
15 years 9 months ago
Security policy analysis using deductive spreadsheets
Anu Singh, C. R. Ramakrishnan, I. V. Ramakrishnan,...
ACSAC
2000
IEEE
15 years 7 months ago
Scalable Policy Driven and General Purpose Public Key Infrastructure (PKI)
V. Prasad, S. Potakamuri, M. Ahern, I. Balabine, M...
100
Voted
CCS
2006
ACM
15 years 7 months ago
Supporting location-based conditions in access control policies
Claudio Agostino Ardagna, Marco Cremonini, Ernesto...