Sciweavers

2358 search results - page 305 / 472
» A Secure Pervasive Environment
Sort
View
WPES
2004
ACM
15 years 10 months ago
Hidden access control policies with hidden credentials
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather tha...
Keith B. Frikken, Mikhail J. Atallah, Jiangtao Li
IPPS
2003
IEEE
15 years 10 months ago
Are E-Commerce Users Defenceless?
We are interested in new ways of threats and attack on the e-commerce. The server side of e-commerce platform is usually very well protected and secured. Unfortunately, this is no...
Matej Trampus, Mojca Ciglaric, Matjaz Pancur, Tone...
ACSAC
2002
IEEE
15 years 9 months ago
A Model for Attribute-Based User-Role Assignment
The Role-Based Access Control (RBAC) model is traditionally used to manually assign users to appropriate roles, based on a specific enterprise policy, thereby authorizing them to ...
Mohammad A. Al-Kahtani, Ravi S. Sandhu
IDTRUST
2010
ACM
15 years 9 months ago
Federated login to TeraGrid
We present a new federated login capability for the TeraGrid, currently the world’s largest and most comprehensive distributed cyberinfrastructure for open scientific research....
Jim Basney, Terry Fleury, Von Welch
ISCC
2000
IEEE
100views Communications» more  ISCC 2000»
15 years 9 months ago
FATIMA: A Firewall-Aware Transparent Internet Mobility Architecture
Ubiquitous communication will be one of the paradigms for the next decades. The use of the Internet in such applications demands for a highly reliable and secure system, especiall...
Stefan Mink, Frank Pählke, Günter Sch&au...