Sciweavers

708 search results - page 55 / 142
» A Policy Based Framework for Access Control
Sort
View
ISW
2009
Springer
15 years 8 months ago
Privacy-Aware Attribute-Based Encryption with User Accountability
As a new public key primitive, attribute-based encryption (ABE) is envisioned to be a promising tool for implementing fine-grained access control. To further address the concern o...
Jin Li, Kui Ren, Bo Zhu, Zhiguo Wan
CODES
2005
IEEE
15 years 7 months ago
Enhancing security through hardware-assisted run-time validation of program data properties
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
CSFW
2004
IEEE
15 years 5 months ago
Owned Policies for Information Security
In many systems, items of information have owners associated with them. An owner of an item of information may want the system to enforce a policy that restricts use of that infor...
Hubie Chen, Stephen Chong
COLCOM
2009
IEEE
15 years 6 months ago
Building a stateful reference monitor with coloured petri nets
The need for collaboration and information sharing has been recently growing dramatically with the convergence of outsourcing and offshoring, the increasing need to cut costs thro...
Basel Katt, Michael Hafner, Xinwen Zhang
WIOPT
2010
IEEE
15 years 9 days ago
Optimal monotone forwarding policies in delay tolerant mobile ad hoc networks with multiple classes of nodes
—In this paper we describe a framework for the optimal control of delay tolerant mobile ad hoc networks where multiple classes of nodes co-exist. We specialize the description of...
Francesco De Pellegrini, Eitan Altman, Tamer Basar