Sciweavers

837 search results - page 51 / 168
» Rewriting-Based Access Control Policies
Sort
View
115
Voted
TMC
2011
219views more  TMC 2011»
14 years 7 months ago
Optimal Channel Access Management with QoS Support for Cognitive Vehicular Networks
We consider the problem of optimal channel access to provide quality of service (QoS) for data transmission in cognitive vehicular networks. In such a network the vehicular nodes ...
Dusit Niyato, Ekram Hossain, Ping Wang
113
Voted
SP
1997
IEEE
126views Security Privacy» more  SP 1997»
15 years 4 months ago
Filtering Postures: Local Enforcement for Global Policies
When packet filtering is used as a security mechanism, different routers may need to cooperate to enforce the desired security policy. It is difficult to ensure that they will d...
Joshua D. Guttman
111
Voted
CCS
2010
ACM
14 years 7 months ago
SecTag: a multi-policy supported secure web tag framework
Traditional web application development often encounters tight coupling problem between access control logic and business logic. It is hard to configure and modify access control ...
Ruixuan Li, Meng Dong, Bin Liu, Jianfeng Lu, Xiaop...
168
Voted
IHI
2012
217views Healthcare» more  IHI 2012»
13 years 8 months ago
Declarative privacy policy: finite models and attribute-based encryption
Regulations and policies regarding Electronic Health Information (EHI) are increasingly complex. Federal and State policy makers have called for both education to increase stakeho...
Peifung E. Lam, John C. Mitchell, Andre Scedrov, S...
112
Voted
ICISS
2005
Springer
15 years 6 months ago
Protection of Relationships in XML Documents with the XML-BB Model
Since XML tends to become the main format to exchange data over the Internet, it is necessary to define a security model to control the access to the content of these documents. S...
Frédéric Cuppens, Nora Cuppens-Boula...