Sciweavers

828 search results - page 24 / 166
» Access Control in Location-Based Services
Sort
View
ICWS
2008
IEEE
13 years 11 months ago
A Theory of Role Composition
We study the access control integration problem for web services. Organizations frequently use many services, each with its own access control policies, that must interoperate whi...
Jeffrey Fischer, Rupak Majumdar
ICICS
2010
Springer
13 years 7 months ago
Fine-Grained Disclosure of Access Policies
Abstract. In open scenarios, where servers may receive requests to access their services from possibly unknown clients, access control is typically based on the evaluation of (cert...
Claudio Agostino Ardagna, Sabrina De Capitani di V...
CSREAPSC
2006
13 years 11 months ago
An Access Control Framework for Pervasive Computing Environments
Abstract. The explosive evolution of pervasive computing environments presents several new challenges such as smart spaces, invisibility, localized scalability, and masking uneven ...
Sarah Javanmardi, Hadi Hemmati, Rasool Jalili
SACMAT
2005
ACM
14 years 3 months ago
Adaptive trust negotiation and access control
Electronic transactions regularly occur between business partners in separate security domains. Trust negotiation is an approach that provides an open authentication and access-co...
Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Travi...
DASFAA
2010
IEEE
176views Database» more  DASFAA 2010»
13 years 10 months ago
Efficient Database-Driven Evaluation of Security Clearance for Federated Access Control of Dynamic XML Documents
Achieving data security over cooperating web services is becoming a reality, but existing XML access control architectures do not consider this federated service computing. In this...
Erwin Leonardi, Sourav S. Bhowmick, Mizuho Iwaihar...