Sciweavers

75 search results - page 4 / 15
» Semantic context aware security policy deployment
Sort
View
RTCSA
2005
IEEE
14 years 4 days ago
Service Delivery in Context Aware Environments: Lookup and Access Control Issues
Large-scale distributed systems, such as ubiquitous computing environments, require a service delivery mechanism in order to keep track of the vast set of services offered and mak...
Maria Riaz, Saad Liaquat Kiani, Sungyoung Lee, San...
WWIC
2004
Springer
197views Communications» more  WWIC 2004»
13 years 12 months ago
Context-Aware Group Communication in Mobile Ad-Hoc Networks
Abstract. The widespread availability of both fixed and wireless network connectivity and the growing market of portable devices are enabling anytime and anywhere impromptu collabo...
Dario Bottazzi, Antonio Corradi, Rebecca Montanari
POLICY
2007
Springer
14 years 21 days ago
Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall
We present a discretionary access control framework that can be used to control a principal’s ability to link information from two or more audit records and compromise a user’...
Apu Kapadia, Prasad Naldurg, Roy H. Campbell
IDTRUST
2010
ACM
14 years 1 months ago
Computational techniques for increasing PKI policy comprehension by human analysts
Natural-language policies found in X.509 PKI describe an organization’s stated policy as a set of requirements for trust. The widespread use of X.509 underscores the importance ...
Gabriel A. Weaver, Scott A. Rea, Sean W. Smith
PLDI
2009
ACM
13 years 11 months ago
Flow-sensitive semantics for dynamic information flow policies
Dynamic information flow policies, such as declassification, are essential for practically useful information flow control systems. However, most systems proposed to date that ...
Niklas Broberg, David Sands