Filters








3,820 Hits in 2.4 sec

Distributed Privilege Enforcement in PACS [chapter]

Christoph Sturm, Ela Hunt, Marc H. Scholl
2009 Lecture Notes in Computer Science  
To avoid a single point of failure at the time of privilege enforcement, we use threshold cryptography to distribute the enforcement among the participants.  ...  We present a new access control mechanism for P2P networks with distributed enforcement, called P2P Access Control System (PACS).  ...  PACS Distributed Enforcement To enable distributed enforcement in PACS, we propose a combination of delegate enforcement and client-side enforcement, as introduced in Section 2.  ... 
doi:10.1007/978-3-642-03007-9_10 fatcat:wqflph2gu5ebfchvcsp6rllxuq

Constitutional Law. Privileges and Immunities Clause. Income Tax on Residents and Non-Residents

1920 The Yale law journal  
enforcement of the act.  ...  7i Kan. 69i, 8i Pac. 505.  ... 
doi:10.2307/786619 fatcat:kzjv2wbiyfbzdeiv7lzv3ysg7u

Role Based Access Control in Distributed Systems [chapter]

M. Vandenwauver, R. Govaerts, J. Vandewalle
1997 IFIP Advances in Information and Communication Technology  
Over the last years, we have been implementing such a scheme that enforces a role based access control mechanism in a distributed computing environment.  ...  This work was done in the framework of the EC-RACE project SESAME.  ...  If a customer needs a different style of security policy, the privilege attribute server can be changed to enforce different rules.  ... 
doi:10.1007/978-0-387-35256-5_13 fatcat:qjvhokwlsjfndppmb6mivrqnue

Exchange of patient records-prototype implementation of a security attributes service in X.500

Marjan Jurečič, Herbert Bunz
1994 Proceedings of the 2nd ACM Conference on Computer and communications security - CCS '94  
Security Attributes associated with an active entity in the distributed system are known as Privilege Attributes.  ...  For use in a distributed system, these Privilege Attributes have to be transferred via communication protocols and thus have to be protected against several attacks.  ... 
doi:10.1145/191177.191185 dblp:conf/ccs/JurecicB94 fatcat:rmvgiw6smvhnxiqwq75bwh5c2q

Conflict of Laws. Death Statutes. Law Governing Distribution of Damages Recovered

1920 The Yale law journal  
enforcement of the act.  ...  R'. (1913) 23 Ida. 642, I32 Pac. M21.  ... 
doi:10.2307/786618 fatcat:ydegpr6gn5fdpk2bcvbtckrf2u

Page 297 of Central Law Journal Vol. 57, Issue [page]

1903 Central Law Journal  
to be enforceable.— Banta v.  ...  DESCENT AND DISTRIBUTION—Dower.  ... 

Corporations. Banks. Stockholders' Liability. Receivers. Wilson et al v. Book et al, 43 Pac. Rep. 939 (Wash.)

1896 The Yale law journal  
Book et at, 43 Pac. Rep. 939 (Wash.).  ...  Boston Safe Dejositand Trust Co., 43 Pac. Rep. 977 (Kan.).  ... 
doi:10.2307/781289 fatcat:qkolrxmrrnbahnd7gmpuw2mz4m

Trusts. Liability of Trustees for Non-Negligent Loss after a Decree of Distribution

1934 Harvard Law Review  
tax in exchange for the privilege.  ...  City of Dinuba, 188 Cal. 664, 206 Pac. 983 (1922).  ... 
doi:10.2307/1331766 fatcat:raewkypvrrairhkxeu5zk2qqqm

Page 378 of Central Law Journal Vol. 59, Issue [page]

1904 Central Law Journal  
LOTTERIES—Distribution by Chance.  ...  378 CENTRAL LAW JOURNAL. privileged, even ifthe report itself was privileged, un der Act 277 of the Philippine Commission,§ 7, as fair re- port of judicial proceedings.— Dorr v.  ... 

Page 138 of Harvard Law Review Vol. 48, Issue 1 [page]

1934 Harvard Law Review  
tax in exchange for the privilege.  ...  City of Dinuba, 188 Cal. 664, 206 Pac. 983 (1922).  ... 

Page 96 of Central Law Journal Vol. 67, Issue [page]

1908 Central Law Journal  
Amend, 14, sec. 1, providing that no state shall make or enforce any law which shall abridge the privileges or immunities of citi- zens of the United States.—Loverin & Browne Co. v.  ...  —In actions for personal injuries, an or- der of the court directing plaintiff to submit to a physical examination before the trial will be enforced by staying or dismissing the ac- tion, and not by punishment  ... 

The Intranet Authorization Paradigm [chapter]

Mark Vandenwauver, Paul Ashley, Gary Gaskell
1999 IFIP Advances in Information and Communication Technology  
It is the centralised administration of security privileges that sets these security architectures apart from other secure technologies such as SSH or Kerberos.  ...  The second is SESAME, a relatively new technology that is very rich in security services.  ...  Furthermore, recent initiatives in the Open Group indicate that the next version of DCE will migrate even closer to the SESAME authorization model.  ... 
doi:10.1007/978-0-387-35575-7_12 fatcat:dhyhe3h2efcofi7hp5vl36dr74

Policy Specification and Enforcement for Smart ID Cards Deployment

Ramaswamy Chandramouli
2008 2008 IEEE Workshop on Policies for Distributed Systems and Networks  
In this paper, we describe the development and implementation of such a framework.  ...  Deployment of smart cards as identity tokens (Smart ID Cards) requires the support of an enterprise system called Identity Management System (IDMS) for collection, storage, processing and distribution  ...  Role-Privilege binding in a session for parameterized roles (Privilege Containment).  ... 
doi:10.1109/policy.2008.14 dblp:conf/policy/Chandramouli08 fatcat:42mphydpbzbifpsffybpmtmhxy

Page 985 of Political Studies Vol. 45, Issue 5 [page]

1997 Political Studies  
Gais demonstrates that the institutional constraints of the PAC system privilege the interests of large economic groups to the detriment of citizens’ groups and the non-profit sector.  ...  Most importantly, it examines the influence of PACs on the political process and, in particular, on the campaigns of the recipients and on the issues raised in the policy process.  ... 

Page 423 of Central Law Journal Vol. 65, Issue [page]

1907 Central Law Journal  
DESCENT AND DISTRIBUTIONPrivilege of Inherit- ance.  ...  Archibald, Cal, 90 Pac. Rep. 536. 48, CONTRACTS—Enforcement of Contract.  ... 
« Previous Showing results 1 — 15 out of 3,820 results