70 resultados para revocation


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mode of access: Internet.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Utah Department of Public Safety, Salt Lake City

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mode of access: Internet.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A continuation of the narrative begun in the author's "Rise of the Huguenots" and concluded in his "Huguenots and the revocation of the Edict of Nantes."

Relevância:

10.00% 10.00%

Publicador:

Resumo:

"November 2011."

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The narrative is continued in the author's "Huguenots and Henry of Navarre", and concluded in his "Huguenots and the revocation of the Edict of Nantes".

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Secure Access For Everyone (SAFE), is an integrated system for managing trust

using a logic-based declarative language. Logical trust systems authorize each

request by constructing a proof from a context---a set of authenticated logic

statements representing credentials and policies issued by various principals

in a networked system. A key barrier to practical use of logical trust systems

is the problem of managing proof contexts: identifying, validating, and

assembling the credentials and policies that are relevant to each trust

decision.

SAFE addresses this challenge by (i) proposing a distributed authenticated data

repository for storing the credentials and policies; (ii) introducing a

programmable credential discovery and assembly layer that generates the

appropriate tailored context for a given request. The authenticated data

repository is built upon a scalable key-value store with its contents named by

secure identifiers and certified by the issuing principal. The SAFE language

provides scripting primitives to generate and organize logic sets representing

credentials and policies, materialize the logic sets as certificates, and link

them to reflect delegation patterns in the application. The authorizer fetches

the logic sets on demand, then validates and caches them locally for further

use. Upon each request, the authorizer constructs the tailored proof context

and provides it to the SAFE inference for certified validation.

Delegation-driven credential linking with certified data distribution provides

flexible and dynamic policy control enabling security and trust infrastructure

to be agile, while addressing the perennial problems related to today's

certificate infrastructure: automated credential discovery, scalable

revocation, and issuing credentials without relying on centralized authority.

We envision SAFE as a new foundation for building secure network systems. We

used SAFE to build secure services based on case studies drawn from practice:

(i) a secure name service resolver similar to DNS that resolves a name across

multi-domain federated systems; (ii) a secure proxy shim to delegate access

control decisions in a key-value store; (iii) an authorization module for a

networked infrastructure-as-a-service system with a federated trust structure

(NSF GENI initiative); and (iv) a secure cooperative data analytics service

that adheres to individual secrecy constraints while disclosing the data. We

present empirical evaluation based on these case studies and demonstrate that

SAFE supports a wide range of applications with low overhead.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cloud storage has rapidly become a cornerstone of many businesses and has moved from an early adopters stage to an early majority, where we typically see explosive deployments. As companies rush to join the cloud revolution, it has become vital to create the necessary tools that will effectively protect users' data from unauthorized access. Nevertheless, sharing data between multiple users' under the same domain in a secure and efficient way is not trivial. In this paper, we propose Sharing in the Rain – a protocol that allows cloud users' to securely share their data based on predefined policies. The proposed protocol is based on Attribute-Based Encryption (ABE) and allows users' to encrypt data based on certain policies and attributes. Moreover, we use a Key-Policy Attribute-Based technique through which access revocation is optimized. More precisely, we show how to securely and efficiently remove access to a file, for a certain user that is misbehaving or is no longer part of a user group, without having to decrypt and re-encrypt the original data with a new key or a new policy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This preliminary study of the drivers involved in major accidents in Iowa and their subsequent examination was undertaken by the State Planning Board. All personal injury and fatal accidents, and those property damage accidents of such serious nature as to indicate the suspension or revocation of the drivers license, occurring in the state from 1935 to April 1036 are included.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We measure the impact of warnings of expropriation and of forced divestments of pri- vate property on the stock prices of the parent company. We use a unique database of 116 events in 12 countries from 2005 to 2013. Our results show signi cant negative effects on the stock prices of different kinds of warnings; the largest effect is when the warning takes the form of a transitory permit revocation. In the case of forced divestments, we nd a signi cant negative impact when there is a permanent revocation of a permit. However, nationalizations seem to generate a positive market reaction.