Sciweavers

75 search results - page 12 / 15
» Semantic context aware security policy deployment
Sort
View
ESORICS
2007
Springer
13 years 11 months ago
Efficient Proving for Practical Distributed Access-Control Systems
We present a new technique for generating a formal proof that an access request satisfies accesscontrol policy, for use in logic-based access-control frameworks. Our approach is t...
Lujo Bauer, Scott Garriss, Michael K. Reiter
SAINT
2006
IEEE
14 years 1 months ago
Dynamic Configuration of Semantic-Based Service Provisioning to Portable Devices
Context-awareness is starting to emerge as a key driving principle for the design and provisioning of pervasive services in pervasive computing environments. Semantic languages se...
Antonio Corradi, Rebecca Montanari, Alessandra Ton...
WWW
2006
ACM
14 years 7 months ago
Designing ethical phishing experiments: a study of (ROT13) rOnl query features
We study how to design experiments to measure the success rates of phishing attacks that are ethical and accurate, which are two requirements of contradictory forces. Namely, an e...
Markus Jakobsson, Jacob Ratkiewicz
EGC
2005
Springer
14 years 18 days ago
Security Architecture for Open Collaborative Environment
Abstract. The paper presents proposed Security Architecture for Open Collaborative Environment (OCE) being developed in the framework of the Collaboratory.nl (CNL) project with the...
Yuri Demchenko, Leon Gommans, Cees de Laat, Bas va...
EUROMICRO
2006
IEEE
14 years 1 months ago
BGP-like TE Capabilities for SHIM6
In this paper we present a comprehensive set of mechanisms that restore to the site administrator the capacity of enforcing Traffic Engineering (TE) policies in a multiaddressed I...
Marcelo Bagnulo, Alberto García-Martí...