We present a new methodology for proving security of encryption systems using what we call Dual System Encryption. Our techniques result in fully secure Identity-Based Encryption ...
XACML is being increasingly adopted in large enterprise systems for specifying access control policies. However, the efficient analysis and integration of multiple policies in suc...
The management of policies in large-scale systems is complex because of the potentially large number of policies and administrators, as well as the diverse types of information th...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
The growing importance of access control has led to the definition of numerous languages for specifying policies. Since these languages are based on different foundations, langua...
Abstract. In distributed computer systems, it is possible that the evaluation of an authorization policy may suffer unexpected failures, perhaps because a sub-policy cannot be eval...