Sciweavers

118
Voted
CCS
2006
ACM
15 years 7 months ago
Safety and consistency in policy-based authorization systems
In trust negotiation and other distributed proving systems, networked entities cooperate to form proofs that are justified by collections of certified attributes. These attributes...
Adam J. Lee, Marianne Winslett
DSN
2004
IEEE
15 years 7 months ago
Component Middleware to Support Non-repudiable Service Interactions
Nick Cook, Paul Robinson, Santosh K. Shrivastava
116
Voted
DSMML
2004
Springer
15 years 7 months ago
Variational Bayes Estimation of Mixing Coefficients
We investigate theoretically some properties of variational Bayes approximations based on estimating the mixing coefficients of known densities. We show that, with probability 1 a...
Bo Wang 0002, D. M. Titterington
131
Voted
CCS
2006
ACM
15 years 7 months ago
Resiliency policies in access control
We introduce the notion of resiliency policies in the context of access control systems. Such policies require an access control system to be resilient to the absence of users. An...
Ninghui Li, Mahesh V. Tripunitara, Qihua Wang
126
Voted
CCS
2006
ACM
15 years 7 months ago
Secure attribute-based systems
Attributes define, classify, or annotate the datum to which they are assigned. However, traditional attribute architectures and cryptosystems are ill-equipped to provide security ...
Matthew Pirretti, Patrick Traynor, Patrick McDanie...