Sciweavers

1134 search results - page 46 / 227
» Distributed Proving in Access-Control Systems
Sort
View
150
Voted
PET
2004
Springer
15 years 8 months ago
A Formal Privacy System and Its Application to Location Based Services
There are a variety of well-known models for access control developed for purposes like formally modeling the access rights on files, databases, and web resources. However, the ex...
Carl A. Gunter, Michael J. May, Stuart G. Stubbleb...
JCS
2008
69views more  JCS 2008»
15 years 2 months ago
Non-delegatable authorities in capability systems
We present a novel technique, known as the non-delegatable authority (NDA), for distributing authority to unconfined subjects in capability systems that prevents them from sharing...
Toby C. Murray, Duncan A. Grove
196
Voted
SIGMOD
2007
ACM
150views Database» more  SIGMOD 2007»
16 years 2 months ago
System design issues in sensor databases
In-network sensor query processing systems (ISQPs), or sensor databases, have been developed to acquire, process and aggregate data from wireless sensor networks (WSNs). Because W...
Qiong Luo, Hejun Wu
POPL
2000
ACM
15 years 7 months ago
A Type System for Expressive Security Policies
Certified code is a general mechanism for enforcing security properties. In this paradigm, untrusted mobile code carries annotations that allow a host to verify its trustworthine...
David Walker
128
Voted
TPDS
2008
121views more  TPDS 2008»
15 years 2 months ago
Secure Collaboration in a Mediator-Free Distributed Environment
The internet and related technologies have made multidomain collaborations a reality. Collaboration enables domains to effectively share resources; however, it introduces several s...
Mohamed Shehab, Arif Ghafoor, Elisa Bertino