Sciweavers

670 search results - page 4 / 134
» A RBAC-Based Policy Information Base
Sort
View
68
Voted
FUIN
2008
93views more  FUIN 2008»
14 years 11 months ago
Logic-based Conflict Detection for Distributed Policies
Policies are used to describe rules that are employed to modify (often distributed) system behaviour at runtime. Typically policies are created by many different people and there a...
Carlo Montangero, Stephan Reiff-Marganiec, Laura S...
CSFW
2005
IEEE
15 years 5 months ago
Language-Based Information Erasure
Real computing systems sometimes need to forget sensitive information. This paper explores the specification and semantics of information erasure policies, which impose a strong,...
Stephen Chong, Andrew C. Myers
CIIT
2007
131views Communications» more  CIIT 2007»
15 years 1 months ago
Intra-federation credential negotiation based on individualized release strategy
In federated world like Shibboleth the release policy- how a member’s personal information to be divulged is set by their home organization. The member has little say in it. In ...
Javed I. Khan, Kailas B. Bobade, Manas Hardas
IPMU
2010
Springer
14 years 10 months ago
Keeping Secrets in Possibilistic Knowledge Bases with Necessity-Valued Privacy Policies
Controlled Query Evaluation (CQE) is a logical framework for the protection of secrets in databases. In this article, we extend the CQE framework to possibilistic logic: knowledge ...
Lena Wiese
74
Voted
EUROMICRO
2004
IEEE
15 years 3 months ago
A Framework for Protecting Web Sevices with IPsec
This paper proposes a WSDL extension for describing IPsec policies for protecting Web Services communications. By using the proposed extension, a Web Service (server) informs to i...
Cássio Ditzel Kropiwiec, Edgard Jamhour, Ca...