Sciweavers

579 search results - page 56 / 116
» Security Enforcement Model for Distributed Usage Control
Sort
View
IACR
2011
124views more  IACR 2011»
12 years 8 months ago
Efficient Multicast Key Distribution Using HOWF-based Access Control Structures
— Both broadcast encryption (BE) protocols and multicast key distribution (MKD) protocols try to solve the same problem of private group communication. For the first time, we dis...
Jing Liu, Qiong Huang, Bo Yang
ICT
2004
Springer
139views Communications» more  ICT 2004»
14 years 2 months ago
A XML Policy-Based Approach for RSVP
This work proposes a XML-based framework for distributing and enforcing RSVP access control policies, for RSVP-aware application servers. Policies are represented by extending XAC...
Emir Toktar, Edgard Jamhour, Carlos Maziero
SASO
2008
IEEE
14 years 3 months ago
A Framework for Self-Protecting Cryptographic Key Management
Demands to match security with performance in Web applications where access to shared data needs to be controlled dynamically make self-protecting security schemes attractive. Yet...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl,...
SP
2007
IEEE
113views Security Privacy» more  SP 2007»
14 years 3 months ago
Usable Mandatory Integrity Protection for Operating Systems
Existing mandatory access control systems for operating systems are difficult to use. We identify several principles for designing usable access control systems and introduce the...
Ninghui Li, Ziqing Mao, Hong Chen
IPPS
2010
IEEE
13 years 6 months ago
On the importance of bandwidth control mechanisms for scheduling on large scale heterogeneous platforms
We study three scheduling problems (file redistribution, independent tasks scheduling and broadcasting) on large scale heterogeneous platforms under the Bounded Multi-port Model. I...
Olivier Beaumont, Hejer Rejeb