Sciweavers

828 search results - page 23 / 166
» Access Control in Location-Based Services
Sort
View
WWW
2007
ACM
14 years 10 months ago
Analyzing web access control policies
XACML has emerged as a popular access control language on the Web, but because of its rich expressiveness, it has proved difficult to analyze in an automated fashion. In this pape...
Vladimir Kolovski, James A. Hendler, Bijan Parsia
CN
2004
86views more  CN 2004»
13 years 9 months ago
Management of abusive and unfair Internet access by quota-based priority control
In a free of charge or flat-rate Internet access environment, there often exists abusive and unfair usage of network resources. In this paper, the Internet access by the dormitory...
Tsung-Ching Lin, Yeali S. Sun, Shi-Chung Chang, Sh...
ACSAC
2000
IEEE
14 years 2 months ago
Extending Java for Package based Access Control
This paper describes an extension of the Java language that provides “programmable security.” The approach augments the Java syntax with constructs for specifying various acce...
John Hale, Mauricio Papa, Oliver Bremer, Rodrigo C...
COMSWARE
2008
IEEE
13 years 11 months ago
Collaborative group membership and access control for JXTA
Abstract-- This paper presents a proposal for group membership and access control services for JXTA, both based on the principle of self-organization and collaboration of peer grou...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...
IADIS
2004
13 years 11 months ago
Authorization of User Profile Access in Identity Management
Distributed management of user profiles and identities allow reuse of profile information for different personalization services but also raises privacy issues. Users need a possi...
Wolfgang Woerndl