Sciweavers

253 search results - page 36 / 51
» Provisions and Obligations in Policy Management and Security...
Sort
View
CNSM
2010
13 years 2 months ago
Semantic scheduling of active measurements for meeting network monitoring objectives
Network control and management techniques (e.g., dynamic path switching, on-demand bandwidth provisioning) rely on active measurements of end-to-end network status. These measureme...
Prasad Calyam, Lakshmi Kumarasamy, Füsun &Oum...
SRDS
2010
IEEE
13 years 5 months ago
An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing
Entities (e.g., users, services) have to authenticate themselves to service providers (SPs) in order to use their services. An entity provides personally identifiable information (...
Pelin Angin, Bharat K. Bhargava, Rohit Ranchal, No...
SACMAT
2005
ACM
14 years 1 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang
SACMAT
2010
ACM
14 years 9 days ago
An access control model for mobile physical objects
Access to distributed databases containing tuples collected about mobile physical objects requires information about the objects’ trajectories. Existing access control models ca...
Florian Kerschbaum
RBAC
1998
84views more  RBAC 1998»
13 years 8 months ago
Decentralized User-role Assignment for Web-based Intranets
The intricacy of security administration is one of the most challenging problems in large networked systems. This problem is especially serious in the Web environment, which consi...
Ravi S. Sandhu, Joon S. Park