Sciweavers

926 search results - page 48 / 186
» Policy framings for access control
Sort
View
FOSAD
2009
Springer
15 years 4 months ago
Logic in Access Control (Tutorial Notes)
Access control is central to security in computer systems. Over the years, there have been many efforts to explain and to improve access control, sometimes with logical ideas and t...
Martín Abadi
ACSAC
1999
IEEE
15 years 2 months ago
An Asynchronous Distributed Access Control Architecture for IP over ATM Networks
In this article, we describe a new architecture providing the access control service in both ATM and IPover-ATM networks. This architecture is based on agents distributed in netwo...
Olivier Paul, Maryline Laurent, Sylvain Gombault
ENTCS
2007
112views more  ENTCS 2007»
14 years 10 months ago
A Holistic Approach to Security Policies - Policy Distribution with XACML over COPS
The potentials of modern information technology can only be exploited, if the underlying infrastructure and the applied applications sufficiently take into account all aspects of ...
Jan Peters, Roland Rieke, Taufiq Rochaeli, Bjö...
SP
2008
IEEE
162views Security Privacy» more  SP 2008»
14 years 10 months ago
Fable: A Language for Enforcing User-defined Security Policies
This paper presents FABLE, a core formalism for a programming language in which programmers may specify security policies and reason that these policies are properly enforced. In ...
Nikhil Swamy, Brian J. Corcoran, Michael Hicks
HICSS
2006
IEEE
126views Biometrics» more  HICSS 2006»
15 years 4 months ago
A Model for Temporal Interval Authorizations
A new model for representing temporal access control policies is introduced. In this model, temporal authorizations are represented by time attributes associated with subjects and...
Francis B. Afinidad, Timothy E. Levin, Cynthia E. ...