Sciweavers

ACSAC
2005
IEEE
14 years 5 months ago
Uniform Application-level Access Control Enforcement of Organizationwide Policies
Fine-grained and expressive access control policies on application resources need to be enforced in applicationlevel code. Uniformly enforcing a single policy (referred to as the ...
Tine Verhanneman, Frank Piessens, Bart De Win, Wou...
OTM
2007
Springer
14 years 6 months ago
Policy-Based Service Registration and Discovery
The WS-Policy framework has been introduced to allow policy to be expressed and associated with Web Services thereby enabling organizations to manage the quality of their services...
Tan Phan, Jun Han, Jean-Guy Schneider, Tim Ebringe...
CPAIOR
2007
Springer
14 years 6 months ago
Replenishment Planning for Stochastic Inventory Systems with Shortage Cost
One of the most important policies adopted in inventory control is the (R,S) policy (also known as the “replenishment cycle” policy). Under the non-stationary demand assumption...
Roberto Rossi, Armagan Tarim, Brahim Hnich, Steven...
CCS
2007
ACM
14 years 6 months ago
A simple and expressive semantic framework for policy composition in access control
In defining large, complex access control policies, one would like to compose sub-policies, perhaps authored by different organizations, into a single global policy. Existing po...
Glenn Bruns, Daniel S. Dantas, Michael Huth
NDSS
2007
IEEE
14 years 6 months ago
Attribute-Based Publishing with Hidden Credentials and Hidden Policies
With Hidden Credentials Alice can send policyencrypted data to Bob in such a way that he can decrypt the data only with the right combination of credentials. Alice gains no knowle...
Apu Kapadia, Patrick P. Tsang, Sean W. Smith
ICNP
2007
IEEE
14 years 6 months ago
FireCracker: A Framework for Inferring Firewall Policies using Smart Probing
A firewall policy that is correct and complete is crucial to the safety of a computer network. An adversary will benefit a lot from knowing the policy or its semantics. In this pap...
Taghrid Samak, Adel El-Atawy, Ehab Al-Shaer
IAT
2007
IEEE
14 years 6 months ago
Analysis of Multi-Actor Policy Contexts Using Perception Graphs
Policy making is a multi-actor process: it involves a variety of actors, each trying to further their own interests. How these actors decide and act largely depends on the way the...
Pieter W. G. Bots
ASWEC
2008
IEEE
14 years 6 months ago
A Survey of Policy-Based Management Approaches for Service Oriented Systems
Policy based management in Service Oriented Architecture (SOA) allows organizations to apply rules and regulations on their business processes. Policy has long been employed in th...
Tan Phan, Jun Han, Jean-Guy Schneider, Tim Ebringe...
SIGCOMM
2009
ACM
14 years 6 months ago
Economic issues in shared infrastructures
We define some interesting incentive issues that arise in the management of virtual infrastructures. We demonstrate that participants’ decisions about the quantities of infrast...
Costas Courcoubetis, Richard R. Weber
SACMAT
2009
ACM
14 years 6 months ago
Access control policy combining: theory meets practice
Many access control policy languages, e.g., XACML, allow a policy to contain multiple sub-policies, and the result of the policy on a request is determined by combining the result...
Ninghui Li, Qihua Wang, Wahbeh H. Qardaji, Elisa B...