Sciweavers

5252 search results - page 96 / 1051
» Logic in Access Control
Sort
View
SACMAT
2004
ACM
15 years 11 months ago
Towards a credential-based implementation of compound access control policies
We describe a layered approach to access control for distributed and interoperable computing systems. Firstly, compound access control policies are conceptually specified, using ...
Joachim Biskup, Sandra Wortmann
INFOCOM
2000
IEEE
15 years 9 months ago
Power Controlled Multiple Access (PCMA) in Wireless Communication Networks
—We address the issue of power-controlled shared channel access in future wireless networks supporting packetized data traffic, beyond the voice-oriented continuous traffic prima...
Nicholas Bambos, Sunil Kandukuri
SACMAT
2009
ACM
15 years 12 months ago
Dynamic mandatory access control for multiple stakeholders
In this paper, we present a mandatory access control system that uses input from multiple stakeholders to compose policies based on runtime information. In the emerging ubiquitous...
Vikhyath Rao, Trent Jaeger
GRID
2005
Springer
15 years 11 months ago
Adaptive trust negotiation and access control for grids
— Access control in computational grids is typically provided by a combination of identity certificates and local accounts. This approach does not scale as the number of users a...
Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Noria...
SACMAT
2004
ACM
15 years 11 months ago
On the role of roles: from role-based to role-sensitive access control
This paper maintains that for an access-control mechanism to support a wide range of policies, it is best to dispense with any built-in semantics for roles in the mechanism itself...
Xuhui Ao, Naftaly H. Minsky