Sciweavers

330 search results - page 11 / 66
» A Policy Language for Integrating Heterogeneous Authorizatio...
Sort
View
ETRICS
2006
14 years 1 months ago
Policy-Based Integration of User and Provider-Sided Identity Management
Abstract. Depending on whether the users or the providers are performing it, Identity Management (IM) traditionally has different meanings. For users, IM means to choose between on...
Wolfgang Hommel
IJAMC
2007
114views more  IJAMC 2007»
13 years 9 months ago
Integration of rules and policies for Semantic Web Services
: Multimedia service providers on the web need their services to be well protected and easily accessible worldwide. This has initiated several lines of research to provide semantic...
Nima Kaviani, Dragan Gasevic, Marek Hatala, David ...
TRUSTBUS
2009
Springer
14 years 4 months ago
Operational Semantics for DKAL: Application and Analysis
DKAL is a new expressive high-level authorization language. It has been successfully tried at Microsoft which led to further improvements of the language itself. One improvement is...
Yuri Gurevich, Arnab Roy
CODASPY
2011
13 years 1 months ago
Relationship-based access control: protection model and policy language
Social Network Systems pioneer a paradigm of access control that is distinct from traditional approaches to access control. Gates coined the term Relationship-Based Access Control...
Philip W. L. Fong
COMPSAC
2007
IEEE
14 years 1 months ago
Conformance Checking of Access Control Policies Specified in XACML
Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to whi...
Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie