Sciweavers

706 search results - page 86 / 142
» Access Control: Policies, Models, and Mechanisms
Sort
View
CCS
2000
ACM
14 years 1 months ago
XML document security based on provisional authorization
The extensible markup language (XML) is a promising standard for describing semi-structured information and contents on the Internet. When XML comes to be a widespread data encodi...
Michiharu Kudo, Satoshi Hada
BPSC
2009
190views Business» more  BPSC 2009»
13 years 10 months ago
Detective Information Flow Analysis for Business Processes
Abstract: We report on ongoing work towards a posteriori detection of illegal information flows for business processes, focusing on the challenges involved in doing so. Resembling ...
Rafael Accorsi, Claus Wonnemann
MICRO
2009
IEEE
129views Hardware» more  MICRO 2009»
14 years 3 months ago
Execution leases: a hardware-supported mechanism for enforcing strong non-interference
High assurance systems such as those found in aircraft controls and the financial industry are often required to handle a mix of tasks where some are niceties (such as the contro...
Mohit Tiwari, Xun Li, Hassan M. G. Wassel, Frederi...
ESORICS
2005
Springer
14 years 2 months ago
On Obligations
Access control is concerned with granting access to sensitive data based on conditions that relate to the past or present, so-called provisions. Expressing requirements from the do...
Manuel Hilty, David A. Basin, Alexander Pretschner
ESCIENCE
2006
IEEE
14 years 15 days ago
Economy-Based Data Replication Broker
Data replication is one of the key components in data grid architecture as it enhances data access and reliability and minimises the cost of data transmission. In this paper, we a...
Henry Lin, Jemal H. Abawajy, Rajkumar Buyya