Sciweavers

253 search results - page 10 / 51
» Provisions and Obligations in Policy Management and Security...
Sort
View
DRM
2008
Springer
13 years 10 months ago
Enforcing DRM policies across applications
In this paper we present Trishul-UCON (T-UCON), a DRM system based on the UCONABC model. T-UCON is designed to be capable of enforcing not only application-specific policies, as a...
Srijith Krishnan Nair, Andrew S. Tanenbaum, Gabrie...
ACSAC
2001
IEEE
14 years 11 days ago
The Authorization Service of Tivoli Policy Director
This paper presents the Authorization Service provided by Tivoli Policy Director (PD) and its use by PD family members as well as third-party applications. Policies are defined ov...
Günter Karjoth
MCAM
2007
Springer
134views Multimedia» more  MCAM 2007»
14 years 2 months ago
Virtual Community Based Secure Service Discovery and Access for 3D Video Steaming Applications
The Freeband I-Share project aims to define the mechanisms for trust, willingness, resource discovery and sharing mechanisms in virtual communities. To improve the secure and perfo...
Shudong Chen, Igor Radovanovic, Johan Lukkien, Ric...
MATA
2005
Springer
170views Communications» more  MATA 2005»
14 years 2 months ago
Adaptive Content for the Mobile User: A Policy-Based Approach
Service adaptation is fundamental to context-aware service provisioning and to the realization of the Virtual Home Environment concept, which is now an integral part of the 3G serv...
Alvin Yew, Antonio Liotta, Kun Yang
IEEEARES
2010
IEEE
14 years 1 months ago
Supporting Authorization Policy Modification in Agile Development of Web Applications
Web applications are increasingly developed in Agile development processes. Business-centric Web applications need complex authorization policies to securely implement business pro...
Steffen Bartsch