Sciweavers

116 search results - page 23 / 24
» Reasoning about XACML policies using CSP
Sort
View
CCS
2007
ACM
13 years 11 months ago
Alpaca: extensible authorization for distributed services
Traditional Public Key Infrastructures (PKI) have not lived up to their promise because there are too many ways to define PKIs, too many cryptographic primitives to build them wi...
Chris Lesniewski-Laas, Bryan Ford, Jacob Strauss, ...
SIGADA
2004
Springer
13 years 11 months ago
Enforcing security and safety models with an information flow analysis tool
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton
OCLC
2007
86views more  OCLC 2007»
13 years 5 months ago
Utrecht University Repository: the evolution of the Igitur archive - a case-study
Purpose – The purpose of this paper is to outline the development of the institutional repository of Utrecht University, the Igitur Archive. The Utrecht repository is unique for...
Saskia Franken, Bas Savenije, Jennifer Smith
WS
2005
ACM
13 years 11 months ago
A framework for MAC protocol misbehavior detection in wireless networks
The pervasiveness of wireless devices and the architectural organization of wireless networks in distributed communities, where no notion of trust can be assumed, are the main rea...
Svetlana Radosavac, John S. Baras, Iordanis Koutso...
ER
1997
Springer
145views Database» more  ER 1997»
13 years 9 months ago
Enterprise Knowledge Management and Conceptual Modelling
Turbulence is in the nature of business environments. Changes brought about because of different requirements such as social, political, technical and economic, exert pressures on ...
Pericles Loucopoulos, Vagelio Kavakli