Sciweavers

282 search results - page 19 / 57
» Private Policy Negotiation
Sort
View
ICDCS
2002
IEEE
14 years 10 days ago
Reasoning about Joint Administration of Access Policies for Coalition Resources
We argue that joint administration of access policies for a dynamic coalition formed by autonomous domains requires that these domains set up a coalition authority that distribute...
Himanshu Khurana, Virgil D. Gligor, John Linn
DSN
2004
IEEE
13 years 11 months ago
Diverse Firewall Design
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. An error in a firewall policy either creates security hole...
Alex X. Liu, Mohamed G. Gouda
PET
2004
Springer
14 years 22 days ago
Language-Based Enforcement of Privacy Policies
Abstract. We develop a language-based approach for modeling and verifying aspects of privacy policies. Our approach relies on information-flow control. Concretely, we use the prog...
Katia Hayati, Martín Abadi
IADIS
2003
13 years 8 months ago
Requirements for Groupware Calendar Systems (GCS): Addressing Social Relationships
This paper challenges the generic single conceptual viewpoint that designers have of groupware and specifically Groupware Calendar Systems (GCS). From the analysis of interviews, ...
Sungmin Park, Howard Harris, Patricia Crosbie
ACSC
2005
IEEE
14 years 1 months ago
Auction Based Resource Negotiation in NOMAD
The challenges faced by mobile and distributed applications include the ability to discover and negotiate for the resources required for execution. The NOMAD (Negotiated Object Mo...
Kris Bubendorfer, John H. Hine