Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJune 2012
Graph-based XACML evaluation
SACMAT '12: Proceedings of the 17th ACM symposium on Access Control Models and TechnologiesPages 83–92https://doi.org/10.1145/2295136.2295153The amount of private information in the Internet is constantly increasing with the explosive growth of cloud computing and social networks. XACML is one of the most important standards for specifying access control policies for web services. The number ...
- research-articleNovember 2009
Deductive policies with XACML
SWS '09: Proceedings of the 2009 ACM workshop on Secure web servicesPages 37–44https://doi.org/10.1145/1655121.1655130SaaS technology might comprise of a bundle of different services provided by different entities. Thus monolithic access policies are not feasible as each of the service partners and the companies using the service would have to provide their internal ...
- ArticleJuly 2009
Policy-based real-time decision-making for personalized service delivery
Personalization of service delivery is an important means for the telecommunication industry of keeping their customers in spite of their market becoming more open to other players. Personalization involves using user-specific, dynamic information about ...
- ArticleJuly 2009
Policy-Based Real-Time Decision-Making for Personalized Service Delivery
POLICY '09: Proceedings of the 2009 IEEE International Symposium on Policies for Distributed Systems and NetworksPages 53–59https://doi.org/10.1109/POLICY.2009.13Personalization of service delivery is an important means for the telecommunication industry of keeping their customers in spite of their market becoming more open to other players. Personalization involves using user-specific, dynamic information about ...
- ArticleApril 2009
Personalization-based optimization of real-time service delivery in a multi-device environment
WCNC'09: Proceedings of the 2009 IEEE conference on Wireless Communications & Networking ConferencePages 3029–3034The success of future NGN services depends on the ability to adapt and personalize service delivery according to the user's context as well as service and device capabilities. Personalization includes not only respecting explicit user preferences, but ...
- articleAugust 2004
Modular authorization and administration
ACM Transactions on Information and System Security (TISSEC), Volume 7, Issue 3Pages 363–391https://doi.org/10.1145/1015040.1015042In large organizations the administration of access privileges (such as the assignment of access rights to a user in a particular role) is handled cooperatively through distributed administrators in various different capacities. A quorum may be ...
- ArticleJune 2004
Role-based access control in ambient and remote space
SACMAT '04: Proceedings of the ninth ACM symposium on Access control models and technologiesPages 21–30https://doi.org/10.1145/990036.990040In the era of Ubiquitous Computing and world-wide data transfer mobility, as an innovative aspect of professional activities, imposes new andcomplex problems of mobile and distributed access to information,services, and on--line negotiations for this ...
- ArticleJune 2003
Cooperative role-based administration
SACMAT '03: Proceedings of the eighth ACM symposium on Access control models and technologiesPages 21–32https://doi.org/10.1145/775412.775416In large organizations the administration of access privileges (such as the assignment of an access right to a user in a particular role) is handled cooperatively through distributed administrators in various different capacities. A quorum may be ...
- ArticleMay 2001
Modular authorization
SACMAT '01: Proceedings of the sixth ACM symposium on Access control models and technologiesPages 97–105https://doi.org/10.1145/373256.373274There are three major drawbacks of a centralized security administration in distributed systems: It creates a bottleneck for request handling, it tends to enforce homogeneous security structures in heterogeneous user groups and organizations, and it is ...