Sciweavers

573 search results - page 60 / 115
» The Policy Machine for Security Policy Management
Sort
View
JSS
2006
118views more  JSS 2006»
14 years 9 months ago
Assessment of eco-security in the Knowledge Grid e-science environment
Ecological security is an important basis of the entire human security system, the cornerstone for human survival. Knowing the status of ecological security is crucial for making ...
Xiaoqing Shi, Jingzhu Zhao, Ouyang Zhiyun
VLDB
2006
ACM
172views Database» more  VLDB 2006»
15 years 10 months ago
Hierarchical hippocratic databases with minimal disclosure for virtual organizations
Abstract The protection of customer privacy is a fundamental issue in today's corporate marketing strategies. Not surprisingly, many research efforts have proposed new privacy...
Fabio Massacci, John Mylopoulos, Nicola Zannone
HOTOS
1999
IEEE
15 years 2 months ago
Flexible Access Control using IPC Redirection
We present a mechanism for inter-process communication (IPC) redirection that enables efficient and flexible access control for micro-kernel systems. In such systems, services are...
Trent Jaeger, Kevin Elphinstone, Jochen Liedtke, V...
ESORICS
2009
Springer
15 years 10 months ago
PCAL: Language Support for Proof-Carrying Authorization Systems
By shifting the burden of proofs to the user, a proof-carrying authorization (PCA) system can automatically enforce complex access control policies. Unfortunately, managing those p...
Avik Chaudhuri, Deepak Garg
PKC
1998
Springer
126views Cryptology» more  PKC 1998»
15 years 2 months ago
Certifying Trust
A basic function of all signatures, digital or not, is to express trust and authority, explicit or implied. This is especially the case with digital signatures used in certificates...
Ilari Lehti, Pekka Nikander