Sciweavers

872 search results - page 23 / 175
» An Access Control Language for a General Provenance Model
Sort
View
OOPSLA
2004
Springer
14 years 27 days ago
Transparent proxies for java futures
A proxy object is a surrogate or placeholder that controls access to another target object. Proxies can be used to support distributed programming, lazy or parallel evaluation, ac...
Polyvios Pratikakis, Jaime Spacco, Michael W. Hick...
ACSAC
2009
IEEE
14 years 2 months ago
Java Security: A Ten Year Retrospective
— The first edition of Java (both the language and the platform) was released in 1995, which contained the all-ornothing security access model. A mid-1997 paper I published in IE...
Li Gong
CCS
2007
ACM
14 years 1 months ago
A simple and expressive semantic framework for policy composition in access control
In defining large, complex access control policies, one would like to compose sub-policies, perhaps authored by different organizations, into a single global policy. Existing po...
Glenn Bruns, Daniel S. Dantas, Michael Huth
SACMAT
2005
ACM
14 years 1 months ago
Relevancy based access control of versioned XML documents
Integration of version and access control of XML documents has the benefit of regulating access to rapidly growing archives of XML documents. Versioned XML documents provide us w...
Mizuho Iwaihara, Somchai Chatvichienchai, Chutipor...
TISSEC
2010
121views more  TISSEC 2010»
13 years 5 months ago
Privacy-aware role-based access control
Privacy has been acknowledged to be a critical requirement for many business (and non-business) environments. Therefore, the definition of an expressive and easy-to-use privacyre...
Qun Ni, Elisa Bertino, Jorge Lobo, Carolyn Brodie,...