Sciweavers

115 search results - page 6 / 23
» Hidden access control policies with hidden credentials
Sort
View
XMLSEC
2003
ACM
15 years 2 months ago
An access control framework for business processes for web services
Business Processes for Web Services are the new paradigm for the lightweight integration of business from different enterprises. Whereas the security and access control policies ...
Hristo Koshutanski, Fabio Massacci
SEC
2008
14 years 10 months ago
Negotiation of Prohibition: An Approach Based on Policy Rewriting
Abstract. In recent security architectures, it is possible that the security policy is not evaluated in a centralized way but requires negotiation between the subject who is reques...
Nora Cuppens-Boulahia, Frédéric Cupp...
DATE
2008
IEEE
136views Hardware» more  DATE 2008»
15 years 3 months ago
A Framework of Stochastic Power Management Using Hidden Markov Model
- The effectiveness of stochastic power management relies on the accurate system and workload model and effective policy optimization. Workload modeling is a machine learning proce...
Ying Tan, Qinru Qiu
ICDCIT
2004
Springer
15 years 2 months ago
Automatic Enforcement of Access Control Policies Among Dynamic Coalitions
The need to securely share information on an ad-hoc basis between collaborating entities is increasingly becoming important. We propose a coalition based access control model (CBAC...
Vijayalakshmi Atluri, Janice Warner
MMMACNS
2005
Springer
15 years 2 months ago
A Modal Logic for Role-Based Access Control
Making correct access-control decisions is central to security, which in turn requires accounting correctly for the identity, credentials, roles, authority, and privileges of users...
Thumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Ch...