Sciweavers

1134 search results - page 45 / 227
» Distributed Proving in Access-Control Systems
Sort
View
ECHT
1992
15 years 6 months ago
Hyperform: Using Extensibility to Develop Dynamic, Open and Distributed Hypertext Systems
An approach to exible hyperbase hypertext database support predicated on the notion of extensibility is presented. The extensible hypertext platform Hyperform implements basic hyp...
Uffe Kock Wiil, John J. Leggett
ICDCS
2005
IEEE
15 years 8 months ago
An Update Protocol for XML Documents in Distributed and Cooperative Systems
Securing data is becoming a crucial need for most internet-based applications. Whereas the problem of data confidentiality has been widely investigated, the problem of how to ens...
Yunhua Koglin, Giovanni Mella, Elisa Bertino, Elen...
99
Voted
POLICY
2004
Springer
15 years 8 months ago
A Decentralized Treatment of a Highly Distributed Chinese-Wall Policy
Access control (AC) technology has come a long way from its roots as the means for sharing resources between processes running on a single machine, to a mechanism for regulating t...
Naftaly H. Minsky
142
Voted
CODASPY
2012
13 years 10 months ago
Identifying native applications with high assurance
Main stream operating system kernels lack a strong and reliable mechanism for identifying the running processes and binding them to the corresponding executable applications. In t...
Hussain M. J. Almohri, Danfeng (Daphne) Yao, Denni...
135
Voted
SACMAT
2003
ACM
15 years 7 months ago
The role control center: features and case studies
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...