Sciweavers

5252 search results - page 99 / 1051
» Logic in Access Control
Sort
View
PKC
2009
Springer
210views Cryptology» more  PKC 2009»
16 years 6 months ago
Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials
In this work, we consider the task of allowing a content provider to enforce complex access control policies on oblivious protocols conducted with anonymous users. As our primary ...
Scott E. Coull, Matthew Green, Susan Hohenberger
EDBT
2006
ACM
177views Database» more  EDBT 2006»
16 years 5 months ago
Authorization-Transparent Access Control for XML Under the Non-Truman Model
In authorization-transparent access control, users formulate their queries against the database schema rather than against authorization views that transform and hide data. The Tru...
Alberto O. Mendelzon, Renée J. Miller, Yaro...
CCS
2006
ACM
15 years 9 months ago
Resiliency policies in access control
We introduce the notion of resiliency policies in the context of access control systems. Such policies require an access control system to be resilient to the absence of users. An...
Ninghui Li, Mahesh V. Tripunitara, Qihua Wang
ICFP
2006
ACM
16 years 5 months ago
Access control in a core calculus of dependency
The Dependency Core Calculus (DCC) is an extension of the computational lambda calculus that was designed in order to capture the notion of dependency that arises in information-f...
Martín Abadi
154
Voted
ICDCS
2006
IEEE
15 years 11 months ago
Dynamic Access Control in a Content-based Publish/Subscribe System with Delivery Guarantees
Content-based publish/subscribe (pub/sub) is a promising paradigm for building asynchronous distributed applications. In many application scenarios, these systems are required to ...
Yuanyuan Zhao, Daniel C. Sturman