Sciweavers

330 search results - page 22 / 66
» A Policy Language for Integrating Heterogeneous Authorizatio...
Sort
View
POLICY
2004
Springer
15 years 5 months ago
PROTON: A Policy-based Solution for Future 4G devices
We present PROTON, a policy-based solution for 4G mobile devices – it allows users to seamlessly connect to highly integrated heterogeneous wireless networks. The key motivation...
Pablo Vidales, Rajiv Chakravorty, Calicrates Polic...
CCS
2005
ACM
15 years 5 months ago
Automated trust negotiation using cryptographic credentials
In automated trust negotiation (ATN), two parties exchange digitally signed credentials that contain attribute information to establish trust and make access control decisions. Be...
Jiangtao Li, Ninghui Li, William H. Winsborough
SAC
2003
ACM
15 years 5 months ago
Eliciting Coordination Policies from Requirements
Software coordination models and languages describe how agents, resources and processes work together to implement a software system. One of their limitations is that they are use...
Henry Muccini, Fabio Mancinelli
ESORICS
2006
Springer
15 years 3 months ago
Policy-Driven Memory Protection for Reconfigurable Hardware
Abstract. While processor based systems often enforce memory protection to prevent the unintended sharing of data between processes, current systems built around reconfigurable har...
Ted Huffmire, Shreyas Prasad, Timothy Sherwood, Ry...
CSFW
2010
IEEE
15 years 3 months ago
Constraining Credential Usage in Logic-Based Access Control
—Authorization logics allow concise specification of flexible access-control policies, and are the basis for logic-based access-control systems. In such systems, resource owner...
Lujo Bauer, Limin Jia, Divya Sharma