Sciweavers

926 search results - page 60 / 186
» Policy framings for access control
Sort
View
WCNC
2008
IEEE
15 years 8 months ago
An End-to-End Measurement-Based Admission Control Policy for VoIP over Wireless Networks
—in this paper, we present a new policy for admitting Voice over IP (VoIP) sessions over wireless networks. Our proposed policy receives the admission information advertised by t...
Ala F. Khalifeh
SACMAT
2011
ACM
14 years 4 months ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deï¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...
JCS
2008
94views more  JCS 2008»
15 years 1 months ago
Preprocessing for controlled query evaluation with availability policy
Controlled Query Evaluation (CQE) defines a logical framework to protect confidential information in a database. By modeling a user's a priori knowledge appropriately, a CQE ...
Joachim Biskup, Lena Wiese
WORDS
2005
IEEE
15 years 7 months ago
An RBAC Framework for Time Constrained Secure Interoperation in Multi-domain Environments
In emerging e-commerce applications, time constrained information sharing between different systems is becoming a common phenomenon. A flexible and efficient mechanism is needed t...
Smithi Piromruen, James B. D. Joshi
CCS
2007
ACM
15 years 8 months ago
Provably secure ciphertext policy ABE
In ciphertext policy attribute-based encryption (CP-ABE), every secret key is associated with a set of attributes, and every ciphertext is associated with an access structure on a...
Ling Cheung, Calvin C. Newport