Sciweavers

837 search results - page 22 / 168
» Rewriting-Based Access Control Policies
Sort
View
TKDE
2008
177views more  TKDE 2008»
13 years 7 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...
INFOCOM
2003
IEEE
14 years 20 days ago
Congestion Control Policies for IP-based CDMA Radio Access Networks
— As CDMA-based cellular networks mature, the current point-to-point links used in connecting base stations to network controllers will evolve to an IP-based Radio Access Network...
Sneha Kumar Kasera, Ramachandran Ramjee, Sandra R....
CSFW
2006
IEEE
14 years 1 months ago
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies
There is a growing interest in establishing rules to regulate the privacy of citizens in the treatment of sensitive personal data such as medical and financial records. Such rule...
Michael J. May, Carl A. Gunter, Insup Lee
ACSAC
2008
IEEE
14 years 1 months ago
Enforcing Role-Based Access Control Policies in Web Services with UML and OCL
Karsten Sohr, Tanveer Mustafa, Xinyu Bao, Gail-Joo...