Sciweavers

579 search results - page 30 / 116
» Security Enforcement Model for Distributed Usage Control
Sort
View
ACSAC
2003
IEEE
14 years 29 days ago
A Policy Validation Framework for Enterprise Authorization Specification
The validation of enterprise authorization specification for conformance to enterprise security policies requires an out-of-band framework in many situations since the enforcing a...
Ramaswamy Chandramouli
CCS
2007
ACM
14 years 1 months ago
Automaton segmentation: a new approach to preserve privacy in xml information brokering
A Distributed Information Brokering System (DIBS) is a peer-to-peer overlay network that comprises diverse data servers and brokering components helping client queries locate the ...
Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hs...
GCC
2003
Springer
14 years 27 days ago
Study on a Secure Access Model for the Grid Catalogue
To solve the security of access to meta-data in computational Grids, by modifying model BLP, a secure access model named GBLP is introduced to support access control to Grid catalo...
Bing Xie, Xiaolin Gui, Qingjiang Wang
DSS
2006
140views more  DSS 2006»
13 years 7 months ago
Access control and audit model for the multidimensional modeling of data warehouses
Due to the sensitive data contained in Data Warehouses (DW), it is essential to specify security measures from the early stages of the DW design and enforce them. Traditional acce...
Eduardo Fernández-Medina, Juan Trujillo, Ro...
ESORICS
2007
Springer
14 years 1 months ago
Obligations and Their Interaction with Programs
Obligations are pervasive in modern systems, often linked to access control decisions. We present a very general model of obligations as objects with state, and discuss its interac...
Daniel J. Dougherty, Kathi Fisler, Shriram Krishna...