Sciweavers

370 search results - page 32 / 74
» Enforcing Access Control Using Risk Assessment
Sort
View
ICWS
2008
IEEE
15 years 3 months ago
A Theory of Role Composition
We study the access control integration problem for web services. Organizations frequently use many services, each with its own access control policies, that must interoperate whi...
Jeffrey Fischer, Rupak Majumdar
ACSC
2002
IEEE
15 years 6 months ago
Bracket Capabilities for Distributed Systems Security
The per-method access control lists of standard middleware technologies allow only simple forms of access control to be expressed and enforced. Research systems based on capabilit...
Mark Evered
JSAC
2011
167views more  JSAC 2011»
14 years 9 months ago
Decentralized Cognitive Radio Control Based on Inference from Primary Link Control Information
This work on cognitive radio access ventures beyond the more traditional “listen-before-talk” paradigm that underlies many cognitive radio access proposals. We exploit the bi-...
Senhua Huang, Xin Liu, Zhi Ding
ICDE
2006
IEEE
128views Database» more  ICDE 2006»
15 years 8 months ago
Taming Compliance with Sarbanes-Oxley Internal Controls Using Database Technology
The Sarbanes-Oxley Act instituted a series of corporate reforms to improve the accuracy and reliability of financial reporting. Sections 302 and 404 of the Act require SEC-reporti...
Rakesh Agrawal, Christopher M. Johnson, Jerry Kier...
ICCS
2001
Springer
15 years 6 months ago
The Policy Machine for Security Policy Management
Abstract. Many different access control policies and models have been developed to suit a variety of goals; these include Role-Based Access Control, One-directional Information Flo...
Vincent C. Hu, Deborah A. Frincke, David F. Ferrai...