Sciweavers

837 search results - page 2 / 168
» Rewriting-Based Access Control Policies
Sort
View
IACR
2011
130views more  IACR 2011»
12 years 5 months ago
Hiding the Policy in Cryptographic Access Control
Abstract. Recently, cryptographic access control has received a lot of attention, mainly due to the availability of efficient Attribute-Based Encryption (ABE) schemes. ABE allows ...
Sascha Müller, Stefan Katzenbeisser
CODASPY
2011
12 years 9 months ago
Relationship-based access control: protection model and policy language
Social Network Systems pioneer a paradigm of access control that is distinct from traditional approaches to access control. Gates coined the term Relationship-Based Access Control...
Philip W. L. Fong
IJNSEC
2010
145views more  IJNSEC 2010»
13 years 1 months ago
Formal Specification of Common Criteria Based Access Control Policy Model
One of the major threats that an enterprise Information system networks are facing today is the Insider threat. As part of the Insider Threat study, lack of an effective access co...
Manpreet Singh, Manjeet S. Patterh
POLICY
2001
Springer
13 years 10 months ago
Translating Role-Based Access Control Policy within Context
Jean Bacon, Michael Lloyd, Ken Moody
POLICY
2004
Springer
13 years 11 months ago
RSVP Policy Control using XACML
This work proposes a XML-based framework for distributing and enforcing RSVP access control policies, for RSVP-aware application servers. Policies are represented by extending XAC...
Emir Toktar, Edgard Jamhour, Carlos Maziero