Sciweavers

1663 search results - page 151 / 333
» Privacy and Identity Management
Sort
View
WSC
2004
15 years 6 months ago
Simulation of Coherent Risk Measures
In financial risk management, a coherent risk measure equals the maximum expected loss under several different probability measures, which are analogous to systems in ranking and ...
Vadim Lesnevski, Barry L. Nelson, Jeremy Staum
CSFW
2007
IEEE
15 years 11 months ago
A Formal Theory of Key Conjuring
Key conjuring is the process by which an attacker obtains an unknown, encrypted key by repeatedly calling a cryptographic API function with random values in place of keys. We prop...
Véronique Cortier, Stéphanie Delaune...
IEEEARES
2006
IEEE
15 years 10 months ago
Supporting Attribute-based Access Control with Ontologies
In highly open systems like the Internet, attribute-based access control (ABAC) has proven its appropriateness. The specification and maintenance of ABAC policies however has tur...
Torsten Priebe, Wolfgang Dobmeier, Nora Kamprath
EUROPKI
2005
Springer
15 years 10 months ago
Development of a Flexible PERMIS Authorisation Module for Shibboleth and Apache Server
This paper describes the development of a flexible Role Based Access Control (RBAC) authorisation module – the Shibboleth and Apache Authorisation Module (SAAM) which is based on...
Wensheng Xu, David W. Chadwick, Sassa Otenko
ACSAC
1999
IEEE
15 years 9 months ago
Security Policy Coordination for Heterogeneous Information Systems
Coordinating security policies in information enclaves is challenging due to their heterogeneity and autonomy. Administrators must reconcile the semantic diversity of data and sec...
John Hale, Pablo Galiasso, Mauricio Papa, Sujeet S...