Sciweavers

468 search results - page 30 / 94
» A compositional framework for access control policies enforc...
Sort
View
WETICE
2003
IEEE
14 years 1 months ago
Design and Implementation of Virtual Private Services
Large scale distributed applications such as electronic commerce and online marketplaces combine network access with multiple storage and computational elements. The distributed r...
Sotiris Ioannidis, Steven M. Bellovin, John Ioanni...
ICWS
2007
IEEE
13 years 10 months ago
Guarding Sensitive Information Streams through the Jungle of Composite Web Services
Complex and dynamic web service compositions may introduce unpredictable and unintentional sharing of security-sensitive data (e.g., credit card numbers) as well as unexpected vul...
Jinpeng Wei, Lenin Singaravelu, Calton Pu
CONTEXT
2003
Springer
14 years 1 months ago
A Generic Framework for Context-Based Distributed Authorizations
In conventional security systems, protected resources such as documents, hardware devices and software applications follow an On/Off access policy. On, allows to grant access and ...
Ghita Kouadri Mostéfaoui, Patrick Bré...
DAGSTUHL
2001
13 years 9 months ago
A Language-Based Approach to Security
Abstract. Language-based security leverages program analysis and program rewriting to enforce security policies. The approach promises efficient enforcement of fine-grained access ...
Fred B. Schneider, J. Gregory Morrisett, Robert Ha...
CSFW
2010
IEEE
14 years 11 days ago
Constraining Credential Usage in Logic-Based Access Control
—Authorization logics allow concise specification of flexible access-control policies, and are the basis for logic-based access-control systems. In such systems, resource owner...
Lujo Bauer, Limin Jia, Divya Sharma