Sciweavers

1134 search results - page 40 / 227
» Distributed Proving in Access-Control Systems
Sort
View
237
Voted
ICDE
2009
IEEE
177views Database» more  ICDE 2009»
16 years 4 months ago
Light-Weight, Runtime Verification of Query Sources
Modern database systems increasingly make use of networked storage. This storage can be in the form of SAN's or in the form of shared-nothing nodes in a cluster. One type of a...
Tingjian Ge, Stanley B. Zdonik
145
Voted
CSFW
2003
IEEE
15 years 7 months ago
Understanding SPKI/SDSI Using First-Order Logic
SPKI/SDSI is a language for expressing distributed access control policy, derived from SPKI and SDSI. We provide a first-order logic (FOL) semantics for SDSI, and show that it ha...
Ninghui Li, John C. Mitchell
PODC
1990
ACM
15 years 6 months ago
Half-Order Modal Logic: How to Prove Real-Time Properties
Abstract. We introduce a novel extension of propositional modal logic that is interpreted over Kripke structures in which a value is associated with every possible world. These val...
Thomas A. Henzinger
DIM
2005
ACM
15 years 4 months ago
Establishing and protecting digital identity in federation systems
We develop solutions for the security and privacy of user identity information in a federation. By federation we mean a group of organizations or service providers which have buil...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
122
Voted
SUTC
2008
IEEE
15 years 9 months ago
Security Enforcement Model for Distributed Usage Control
Recently proposed usage control concept and models extend traditional access control models with features for contemporary distributed computing systems, including continuous acce...
Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu