Sciweavers

486 search results - page 36 / 98
» policy 2005
Sort
View
INFOCOM
2005
IEEE
15 years 3 months ago
Optimizing cost-sensitive trust-negotiation protocols
Trust negotiation is a process that establishes mutual trust by the exchange of digital credentials and/or guiding policies among entities who may have no pre-existing knowledge a...
Weifeng Chen, L. Clarke, James F. Kurose, Donald F...
UML
2005
Springer
15 years 3 months ago
A Formal Enforcement Framework for Role-Based Access Control Using Aspect-Oriented Programming
Many of today’s software applications require a high-level of security, defined by a detailed policy and attained via mechanisms such as role-based access control (RBAC), mandat...
Jaime A. Pavlich-Mariscal, Laurent Michel, Steven ...
ASM
2005
ASM
15 years 3 months ago
CoreASM: An Extensible ASM Execution Engine
In this paper we introduce a new research effort in making state machines executable. The aim is to specify and implement an execution engine for a language that is as close as po...
Roozbeh Farahbod, Vincenzo Gervasi, Uwe Gläss...
CIMCA
2005
IEEE
15 years 3 months ago
Access Control for Shared Resources
Access control for shared resources is a complex and challenging task, in particular if the access control policy should be able to cope with different kind of sharing and collabo...
Erik Wilde, Nick Nabholz
95
Voted
ICISS
2005
Springer
15 years 3 months ago
Protection of Relationships in XML Documents with the XML-BB Model
Since XML tends to become the main format to exchange data over the Internet, it is necessary to define a security model to control the access to the content of these documents. S...
Frédéric Cuppens, Nora Cuppens-Boula...