Sciweavers

837 search results - page 101 / 168
» Rewriting-Based Access Control Policies
Sort
View
103
Voted
JSAC
2007
107views more  JSAC 2007»
15 years 15 days ago
Admission control in data transfers over lightpaths
—The availability of optical network infrastructure and appropriate user control software has recently made it possible for scientists to establish end-to-end circuits across mul...
Wojciech M. Golab, Raouf Boutaba
98
Voted
IFIP
2004
Springer
15 years 6 months ago
An Interactive Trust Management and Negotiation Scheme
Interactive access control allows a server to compute and communicate on the fly the missing credentials to a client and to adapt its responses on the basis of presented and decli...
Hristo Koshutanski, Fabio Massacci
90
Voted
SAC
2008
ACM
15 years 3 days ago
Web service access management for integration with agent systems
The agent paradigm includes the notion that agents interact with services. This paper identifies the need for controlled access to such services, from the perspective of agent sys...
Benno J. Overeinder, P. D. Verkaik, Frances M. T. ...
VLDB
2006
ACM
172views Database» more  VLDB 2006»
16 years 26 days ago
Hierarchical hippocratic databases with minimal disclosure for virtual organizations
Abstract The protection of customer privacy is a fundamental issue in today's corporate marketing strategies. Not surprisingly, many research efforts have proposed new privacy...
Fabio Massacci, John Mylopoulos, Nicola Zannone
123
Voted
CCS
2008
ACM
15 years 2 months ago
Towards automatic reverse engineering of software security configurations
The specifications of an application's security configuration are crucial for understanding its security policies, which can be very helpful in security-related contexts such...
Rui Wang 0010, XiaoFeng Wang, Kehuan Zhang, Zhuowe...