Sciweavers

176 search results - page 5 / 36
» Mobile-driven architecture for managing enterprise security ...
Sort
View
ICCS
2001
Springer
15 years 1 months ago
The Policy Machine for Security Policy Management
Abstract. Many different access control policies and models have been developed to suit a variety of goals; these include Role-Based Access Control, One-directional Information Flo...
Vincent C. Hu, Deborah A. Frincke, David F. Ferrai...
TISSEC
2002
82views more  TISSEC 2002»
14 years 9 months ago
Trust management for IPsec
IPsec is the standard suite of protocols for networklayer confidentiality and authentication of Internet traffic. The IPsec protocols, however, do not address the policies for how...
Matt Blaze, John Ioannidis, Angelos D. Keromytis
DEXAW
2002
IEEE
112views Database» more  DEXAW 2002»
15 years 2 months ago
Privacy-Enabled Services for Enterprises
The IBM Enterprise Privacy Architecture (EPA) is a methodology for enterprises to provide an enhanced and well-defined level of privacy to their customers. EPA is structured in f...
Günter Karjoth, Matthias Schunter, Michael Wa...
ACSAC
2001
IEEE
15 years 1 months ago
The Authorization Service of Tivoli Policy Director
This paper presents the Authorization Service provided by Tivoli Policy Director (PD) and its use by PD family members as well as third-party applications. Policies are defined ov...
Günter Karjoth
SACMAT
2011
ACM
14 years 8 days ago
xDAuth: a scalable and lightweight framework for cross domain access control and delegation
Cross domain resource sharing and collaborations have become pervasive in today’s service oriented organizations. Existing approaches for the realization of cross domain access ...
Masoom Alam, Xinwen Zhang, Kamran Khan, Gohar Ali