Sciweavers

837 search results - page 61 / 168
» Rewriting-Based Access Control Policies
Sort
View
94
Voted
CSFW
2008
IEEE
15 years 7 months ago
Evidence-Based Audit
Authorization logics provide a principled and flexible approach to specifying access control policies. One of their compelling benefits is that a proof in the logic is evidence ...
Jeffrey A. Vaughan, Limin Jia, Karl Mazurak, Steve...
116
Voted
WCNC
2008
IEEE
15 years 7 months ago
An End-to-End Measurement-Based Admission Control Policy for VoIP over Wireless Networks
—in this paper, we present a new policy for admitting Voice over IP (VoIP) sessions over wireless networks. Our proposed policy receives the admission information advertised by t...
Ala F. Khalifeh
95
Voted
JCS
2008
94views more  JCS 2008»
15 years 2 days ago
Preprocessing for controlled query evaluation with availability policy
Controlled Query Evaluation (CQE) defines a logical framework to protect confidential information in a database. By modeling a user's a priori knowledge appropriately, a CQE ...
Joachim Biskup, Lena Wiese
96
Voted
WORDS
2005
IEEE
15 years 6 months ago
An RBAC Framework for Time Constrained Secure Interoperation in Multi-domain Environments
In emerging e-commerce applications, time constrained information sharing between different systems is becoming a common phenomenon. A flexible and efficient mechanism is needed t...
Smithi Piromruen, James B. D. Joshi
108
Voted
CCS
2007
ACM
15 years 6 months ago
Provably secure ciphertext policy ABE
In ciphertext policy attribute-based encryption (CP-ABE), every secret key is associated with a set of attributes, and every ciphertext is associated with an access structure on a...
Ling Cheung, Calvin C. Newport