Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

10 results
Keywords : Authorization
Image document

Inference Leakage Detection for Authorization Policies over RDF Data

Tarek Sayah , Emmanuel Coquery , Romuald Thion , Mohand-Said Hacid
29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.346-361, ⟨10.1007/978-3-319-20810-7_24⟩
Conference papers hal-01745813v1
Image document

Rule Enforcement with Third Parties in Secure Cooperative Data Access

Meixing Le , Krishna Kant , Sushil Jajodia
27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.282-288, ⟨10.1007/978-3-642-39256-6_20⟩
Conference papers hal-01490712v1
Image document

Usage Control Model Specification in XACML Policy Language

Um E-Ghazia , Rahat Masood , Muhammad Awais Shibli , Muhammad Bilal
11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.68-79, ⟨10.1007/978-3-642-33260-9_5⟩
Conference papers hal-01551723v1
Image document

Role-Based Secure Inter-operation and Resource Usage Management in Mobile Grid Systems

Antonios Gouglidis , Ioannis Mavridis
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.38-53, ⟨10.1007/978-3-642-21040-2_3⟩
Conference papers hal-01573308v1
Image document

Inter-ReBAC: Inter-operation of Relationship-Based Access Control Model Instances

Jason Crampton , James Sellwood
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.96-105, ⟨10.1007/978-3-319-41483-6_7⟩
Conference papers hal-01633675v1
Image document

Trust Agreement in Wireless Mesh Networks

Andreas Noack
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.336-350, ⟨10.1007/978-3-642-21040-2_24⟩
Conference papers hal-01573304v1
Image document

The Design of a Single Funding Point Charging Architecture

Christos Tsiaras , Martin Waldburger , Guilherme Sperb Machado , Andrei Vancea , Burkhard Stiller
18th European Conference on Information and Communications Technologies (EUNICE), Aug 2012, Budapest, Hungary. pp.148-160, ⟨10.1007/978-3-642-32808-4_14⟩
Conference papers hal-01543145v1
Image document

Role-Centric Circle-of-Trust in Multi-tenant Cloud IaaS

Navid Pustchi , Ravi Sandhu
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.106-121, ⟨10.1007/978-3-319-41483-6_8⟩
Conference papers hal-01633665v1
Image document

Enabling the Autonomic Management of Federated Identity Providers

Christopher Bailey , David W. Chadwick , Rogério De Lemos , Kristy S. Siu
7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.100-111, ⟨10.1007/978-3-642-38998-6_14⟩
Conference papers hal-01489959v1
Image document

ROAC: A Role-Oriented Access Control Model

Nezar Nassr , Eric Steegmans
6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.113-127, ⟨10.1007/978-3-642-30955-7_11⟩
Conference papers hal-01534310v1