Sciweavers

579 search results - page 6 / 116
» Security Enforcement Model for Distributed Usage Control
Sort
View
ICSOC
2004
Springer
14 years 1 months ago
An OGSA-based accounting system for allocation enforcement across HPC centers
In this paper, we present an Open Grid Services Architecture (OGSA)-based decentralized allocation enforcement system, developed with an emphasis on a consistent data model and ea...
Thomas Sandholm, Peter Gardfjäll, Erik Elmrot...
MODELS
2007
Springer
14 years 1 months ago
Modeling and Enforcing Advanced Access Control Policies in Healthcare Systems with Sectet
Abstract. This contribution gives an overview of various access control strategies in use in contemporary healthcare scenarios and shows how a broad variety of respective policies ...
Michael Hafner, Mukhtiar Memon, Muhammad Alam
IJNSEC
2007
139views more  IJNSEC 2007»
13 years 7 months ago
Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications
Large scale distributed applications combine network access with multiple storage and computational elements. The distributed responsibility for resource control creates new secur...
Sotiris Ioannidis, Steven M. Bellovin, John Ioanni...
CSFW
2010
IEEE
13 years 11 months ago
Constraining Credential Usage in Logic-Based Access Control
—Authorization logics allow concise specification of flexible access-control policies, and are the basis for logic-based access-control systems. In such systems, resource owner...
Lujo Bauer, Limin Jia, Divya Sharma
ENTCS
2008
136views more  ENTCS 2008»
13 years 7 months ago
A Virtual Machine Based Information Flow Control System for Policy Enforcement
The ability to enforce usage policies attached to data in a fine grained manner requires that the system be able to trace and control the flow of information within it. This paper...
Srijith Krishnan Nair, Patrick N. D. Simpson, Brun...