Sciweavers

393 search results - page 18 / 79
» Security Architectures for Controlled Digital Information Di...
Sort
View
TRUSTBUS
2010
Springer
13 years 5 months ago
Extending XACML Access Control Architecture for Allowing Preference-Based Authorisation
: European data protection regulation states that organisations must have data subjects’ consent to use their personally identifiable information (PII) for a variety of purposes....
Gina Kounga, Marco Casassa Mont, Pete Bramhall
ACMICEC
2007
ACM
163views ECommerce» more  ACMICEC 2007»
13 years 11 months ago
Digital rights management using a mobile phone
This paper focuses on the problem of preventing illegal copying of digital assets without jeopardising the right of legitimate licence holders to transfer content between their ow...
Imad M. Abbadi, Chris J. Mitchell
ASPLOS
2006
ACM
14 years 1 months ago
Architectural support for software-based protection
Control-Flow Integrity (CFI) is a property that guarantees program control flow cannot be subverted by a malicious adversary, even if the adversary has complete control of data m...
Mihai Budiu, Úlfar Erlingsson, Martí...
ACSAC
1999
IEEE
13 years 11 months ago
A Distributed Certificate Management System (DCMS) Supporting Group-Based Access Controls
Mainly for scalability reasons, many cryptographic security protocols make use of public key cryptography and require the existence of a corresponding public key infrastructure (P...
Rolf Oppliger, Andreas Greulich, Peter Trachsel
MOBIHOC
2003
ACM
14 years 7 months ago
Topology management in ad hoc networks
The efficiency of a communication network depends not only on its control protocols, but also on its topology. We propose a distributed topology management algorithm that construc...
Lichun Bao, J. J. Garcia-Luna-Aceves