Sciweavers

804 search results - page 9 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
WPES
2004
ACM
15 years 5 months ago
Hidden access control policies with hidden credentials
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather tha...
Keith B. Frikken, Mikhail J. Atallah, Jiangtao Li
ICC
2008
IEEE
15 years 6 months ago
Throughput Analysis of Frequency-Agile Medium Access Control Protocols
Abstract—In this paper, we analyze three opportunistic multichannel MAC protocols that associate a newcoming terminal station to one of the access points available within its tra...
Alexandre de Baynast, Lili Wu, Petri Mähö...
CCS
2008
ACM
15 years 1 months ago
Mechanisms for usage control
Usage control is a generalization of access control that also addresses how data is used after it is released. We present a formal model for different mechanisms that can enforce ...
Alexander Pretschner, Manuel Hilty, David A. Basin...
SACMAT
2004
ACM
15 years 5 months ago
A role-based approach to access control for XML databases
In order to provide a general access control methodology for parts of XML documents, we propose combining rolebased access control as found in the Role Graph Model, with a methodo...
Jingzhu Wang, Sylvia L. Osborn
SWS
2004
ACM
15 years 5 months ago
Applying hierarchical and role-based access control to XML documents
W3C Recommendations XML Encryption and XML-Digital Signature can be used to protect the confidentiality of and provide assurances about the integrity of XML documents transmitted...
Jason Crampton