XACML

Results: 149



#Item
511  Cost-Effective Enforcement of Access and Usage Control Policies under Uncertainties Leanid Krautsevich∗, Aliaksandr Lazouski†, Fabio Martinelli† , Artsiom Yautsiukhin† of Computer Science, University of Pisa,

1 Cost-Effective Enforcement of Access and Usage Control Policies under Uncertainties Leanid Krautsevich∗, Aliaksandr Lazouski†, Fabio Martinelli† , Artsiom Yautsiukhin† of Computer Science, University of Pisa,

Add to Reading List

Source URL: wwwold.iit.cnr.it

Language: English - Date: 2012-10-09 09:04:02
52Enforcing RFID Data Visibility Restrictions Using XACML Security Policies Miguel L. Pardal† , Mark Harrison‡ , Sanjay Sarma§ , Jos´e Alves Marques† † Department  of Computer Science and Engineering

Enforcing RFID Data Visibility Restrictions Using XACML Security Policies Miguel L. Pardal† , Mark Harrison‡ , Sanjay Sarma§ , Jos´e Alves Marques† † Department of Computer Science and Engineering

Add to Reading List

Source URL: web.ist.utl.pt

Language: English - Date: 2014-07-09 11:23:58
53Integration of Quantitative Methods for Risk Evaluation within Usage Control Policies Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori, Artsiom Yautsiukhin Istituto di Informatica e Telematica, Consi

Integration of Quantitative Methods for Risk Evaluation within Usage Control Policies Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori, Artsiom Yautsiukhin Istituto di Informatica e Telematica, Consi

Add to Reading List

Source URL: wwwold.iit.cnr.it

Language: English - Date: 2014-09-19 11:36:58
54Towards A Conceptual Model For Privacy Policies Marco Casassa Mont, Siani Pearson, Sadie Creese, Michael Goldsmith, Nick Papanikolaou HP Laboratories HPL[removed]Keyword(s): privacy policies, policy hierarchy, policy ref

Towards A Conceptual Model For Privacy Policies Marco Casassa Mont, Siani Pearson, Sadie Creese, Michael Goldsmith, Nick Papanikolaou HP Laboratories HPL[removed]Keyword(s): privacy policies, policy hierarchy, policy ref

Add to Reading List

Source URL: shiftleft.com

Language: English - Date: 2010-07-21 19:05:14
55INTER-TRUST – ICT FP7- G.A[removed]Interoperable Trust Assurance Infrastructure Description of models for the

INTER-TRUST – ICT FP7- G.A[removed]Interoperable Trust Assurance Infrastructure Description of models for the

Add to Reading List

Source URL: inter-trust.lcc.uma.es

Language: English - Date: 2013-09-16 06:00:41
56Performance Assessment of XACML Authorizations for Supply Chain Traceability Web Services Miguel L. Pardal† , Mark Harrison‡ , Sanjay Sarma§ , Jos´e Alves Marques† † Department  of Computer Science and Engineer

Performance Assessment of XACML Authorizations for Supply Chain Traceability Web Services Miguel L. Pardal† , Mark Harrison‡ , Sanjay Sarma§ , Jos´e Alves Marques† † Department of Computer Science and Engineer

Add to Reading List

Source URL: web.ist.utl.pt

Language: English - Date: 2014-07-09 11:23:58
57Policy 2001 Workshop on Policies for Distributed Systems and Networks[removed]January 2001 Hosted by HP Laboratories, Bristol, UK Technical Co-sponsored by IEEE ComSoc

Policy 2001 Workshop on Policies for Distributed Systems and Networks[removed]January 2001 Hosted by HP Laboratories, Bristol, UK Technical Co-sponsored by IEEE ComSoc

Add to Reading List

Source URL: www.policy-workshop.org

Language: English - Date: 2001-01-24 06:13:18
58How soon can you decide whether Alice is permitted to communicate or share resources with Bob? Bernard Butler and Brendan Jennings TSSG, Waterford Institute of Technology, Ireland {bbutler,bjennings}@ieee.org

How soon can you decide whether Alice is permitted to communicate or share resources with Bob? Bernard Butler and Brendan Jennings TSSG, Waterford Institute of Technology, Ireland {bbutler,bjennings}@ieee.org

Add to Reading List

Source URL: tinytocs.org

Language: English - Date: 2013-04-02 18:41:25
59Usage Control, Risk and Trust Leanid Krautsevich1,2, Aliaksandr Lazouski1,2 , Fabio Martinelli2 , Paolo Mori2 , and Artsiom Yautsiukhin2 1 2

Usage Control, Risk and Trust Leanid Krautsevich1,2, Aliaksandr Lazouski1,2 , Fabio Martinelli2 , Paolo Mori2 , and Artsiom Yautsiukhin2 1 2

Add to Reading List

Source URL: wwwold.iit.cnr.it

Language: English - Date: 2011-08-10 05:58:47
60risk-aware-usage-control.dvi

risk-aware-usage-control.dvi

Add to Reading List

Source URL: wwwold.iit.cnr.it

Language: English - Date: 2011-08-10 05:58:47