Sciweavers

868 search results - page 1 / 174
» Resiliency policies in access control
Sort
View
CCS
2006
ACM
13 years 8 months ago
Resiliency policies in access control
We introduce the notion of resiliency policies in the context of access control systems. Such policies require an access control system to be resilient to the absence of users. An...
Ninghui Li, Mahesh V. Tripunitara, Qihua Wang
ACSAC
2009
IEEE
13 years 8 months ago
A Network Access Control Mechanism Based on Behavior Profiles
Abstract--Current Network Access Control (NAC) technologies manage the access of new devices into a network to prevent rogue devices from attacking network hosts or services. Typic...
Vanessa Frías-Martínez, Joseph Sherr...
DBSEC
2010
162views Database» more  DBSEC 2010»
13 years 5 months ago
Distributed and Secure Access Control in P2P Databases
The intent of peer data management systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to...
Angela Bonifati, Ruilin Liu, Hui (Wendy) Wang
ESORICS
2008
Springer
13 years 6 months ago
On the Security of Delegation in Access Control Systems
Delegation is a mechanism that allows a user A to act on another user B's behalf by making B's access rights available to A. It is well recognized as an important mechani...
Qihua Wang, Ninghui Li, Hong Chen
POLICY
2001
Springer
13 years 8 months ago
Translating Role-Based Access Control Policy within Context
Jean Bacon, Michael Lloyd, Ken Moody