Sciweavers

565 search results - page 8 / 113
» A logic for authorization provenance
Sort
View
DEXAW
2009
IEEE
171views Database» more  DEXAW 2009»
14 years 2 months ago
Ontology Knowledge Authoring by Natural Language Empowerment
One of the main limitations in using ontologies in modern information systems is due to the fact that the design and maintenance of ontologies is a complex activity that requires ...
Alfio Ferrara, Stefano Montanelli, Gaia Varese, Si...
CCS
2007
ACM
14 years 1 months ago
Alpaca: extensible authorization for distributed services
Traditional Public Key Infrastructures (PKI) have not lived up to their promise because there are too many ways to define PKIs, too many cryptographic primitives to build them wi...
Chris Lesniewski-Laas, Bryan Ford, Jacob Strauss, ...
ACSAC
1999
IEEE
13 years 11 months ago
A Resource Access Decision Service for CORBA-Based Distributed Systems
Decoupling authorization logic from application logic allows applications with fine-grain access control requirements to be independent from a particular access control policy and...
Konstantin Beznosov, Yi Deng, Bob Blakley, C. Burt...
ECTEL
2006
Springer
13 years 11 months ago
Multimedia Authoring for CoPs
One way of providing technological support for CoPs is to help participants to produce, structure and share information. As this information becomes more and more multimedia in nat...
Romain Deltour, Agnès Guerraz, Cécil...
JCS
2007
103views more  JCS 2007»
13 years 7 months ago
Risk management for distributed authorization
Distributed authorization takes into account several elements, including certificates that may be provided by non-local actors. While most trust management systems treat all asse...
Christian Skalka, Xiaoyang Sean Wang, Peter C. Cha...