Sciweavers

837 search results - page 83 / 168
» Rewriting-Based Access Control Policies
Sort
View
132
Voted
WPES
2003
ACM
15 years 5 months ago
Policy migration for sensitive credentials in trust negotiation
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iterative disclosure of digital credentials. Under automated trust negotiation, acc...
Ting Yu, Marianne Winslett
100
Voted
ESOP
2010
Springer
15 years 10 months ago
Enforcing Stateful Authorization and Information Flow Policies in Fine
Proving software free of security bugs is hard. Languages that ensure that programs correctly enforce their security policies would help, but, to date, no security-typed language h...
Nikhil Swamy, Juan Chen and Ravi Chugh
88
Voted
IEEEARES
2008
IEEE
15 years 7 months ago
Static Validation of Licence Conformance Policies
Policy conformance is a security property gaining importance due to commercial interest like Digital Rights Management. It is well known that static analysis can be used to valida...
René Rydhof Hansen, Flemming Nielson, Hanne...
GLOBECOM
2008
IEEE
15 years 7 months ago
Joint Scheduling and Rate Control Algorithms for Stable Throughput Maximization under Channel Estimation in Single-Hop Wireless
—We characterize the stability region of wireless, single-hop networks with time-varying imperfect channels. We define a joint scheduling and transmission rate control policy th...
Anna Pantelidou, Anthony Ephremides
CCS
2005
ACM
15 years 6 months ago
PeerAccess: a logic for distributed authorization
This paper introduces the PeerAccess framework for reasoning about authorization in open distributed systems, and shows how a parameterization of the framework can be used to reas...
Marianne Winslett, Charles C. Zhang, Piero A. Bona...