Sciweavers

868 search results - page 12 / 174
» Resiliency policies in access control
Sort
View
IFIP
2010
Springer
14 years 6 months ago
Cryptographic Enforcement of Role-Based Access Control
Many cryptographic schemes have been designed to enforce information flow policies. However, enterprise security requirements are often better encoded, or can only be encoded, usin...
Jason Crampton
SP
2010
IEEE
149views Security Privacy» more  SP 2010»
15 years 3 months ago
On the Incoherencies in Web Browser Access Control Policies
—Web browsers’ access control policies have evolved
Kapil Singh, Alexander Moshchuk, Helen J. Wang, We...
CCS
2009
ACM
16 years 10 days ago
D-algebra for composing access control policy decisions
This paper proposes a D-algebra to compose decisions from multiple access control policies. Compared to other algebrabased approaches aimed at policy composition, D-algebra is the...
Qun Ni, Elisa Bertino, Jorge Lobo
CBMS
2006
IEEE
15 years 5 months ago
How to Break Access Control in a Controlled Manner
The Electronic Medical Record (EMR) integrates heterogeneous information within a Healthcare Institution stressing the need for security and access control. The Biostatistics and ...
Ana Ferreira, Ricardo João Cruz Correia, Lu...
IFIP
2003
Springer
15 years 5 months ago
A Probabilistic Topology Unaware TDMA Medium Access Control Policy for Ad Hoc Environments
The design of an efficient Medium Access Control (MAC) is challenging in ad-hoc networks where users can enter, leave or move inside the network without any need for prior configu...
Konstantinos Oikonomou, Ioannis Stavrakakis