Sciweavers

2560 search results - page 332 / 512
» Securing VO Management
Sort
View
159
Voted
SIS
2004
15 years 6 months ago
Semantic Interoperability of Authorizations
The shift from paper documents to their respective electronic formats is producing important advantages in the functioning of businesses and Public Administrations. However, this s...
Mariemma Inmaculada Yagüe del Valle, Antonio ...
126
Voted
IM
2003
15 years 6 months ago
Firewall Policy Advisor for Anomaly Discovery and Rule Editing
Abstract: Firewalls are core elements in network security. However, managing firewall rules, especially for enterprize networks, has become complex and error-prone. Firewall filt...
Ehab S. Al-Shaer, Hazem H. Hamed
SACMAT
2010
ACM
15 years 3 months ago
Role mining based on weights
Role mining from the existing permissions has been widely applied to aid the process of migrating to an RBAC system. While all permissions are treated evenly in previous approache...
Xiaopu Ma, Ruixuan Li, Zhengding Lu
160
Voted
SIN
2010
ACM
15 years 2 months ago
A calculus for the qualitative risk assessment of policy override authorization
Policy override is gaining traction in the research community to improve the efficiency and usability of authorization mechanisms. These mechanisms turn the conventional privilege...
Steffen Bartsch
ANCS
2009
ACM
15 years 2 months ago
OASis: towards extensible open-architecture services platforms
In this paper, we propose an extensible Open-Architecture Services platform (OASis) for high-performance network processing. OASis embraces recent advances of open technologies, i...
Yaxuan Qi, Fei He, Xiang Wang, Xinming Chen, Yibo ...