Sciweavers

926 search results - page 49 / 186
» Policy framings for access control
Sort
View
96
Voted
SP
1997
IEEE
126views Security Privacy» more  SP 1997»
15 years 2 months ago
Filtering Postures: Local Enforcement for Global Policies
When packet filtering is used as a security mechanism, different routers may need to cooperate to enforce the desired security policy. It is difficult to ensure that they will d...
Joshua D. Guttman
ICISS
2005
Springer
15 years 3 months ago
Protection of Relationships in XML Documents with the XML-BB Model
Since XML tends to become the main format to exchange data over the Internet, it is necessary to define a security model to control the access to the content of these documents. S...
Frédéric Cuppens, Nora Cuppens-Boula...
CSFW
2006
IEEE
15 years 4 months ago
Non-Interference in Constructive Authorization Logic
We present a constructive authorization logic where the meanings of connectives are defined by their associated inference rules. This ensures that the logical reading of access c...
Deepak Garg, Frank Pfenning
GLOBECOM
2009
IEEE
15 years 2 months ago
Multi-Frame Distributed Protocol for Analog Network Coding in Slow-Fading Channels
The wireless network scenario here is based on N users that communicate one with the others through a central relay node by adopting the Analog Network Coding (ANC) paradigm. In th...
Jonathan Gambini, Umberto Spagnolini
SACMAT
2009
ACM
15 years 4 months ago
An algebra for fine-grained integration of XACML policies
Collaborative and distributed applications, such as dynamic coalitions and virtualized grid computing, often require integrating access control policies of collaborating parties. ...
Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, ...