Sciweavers

233 search results - page 25 / 47
» Enforcement of a P3P Privacy Policy
Sort
View
ESORICS
2007
Springer
14 years 1 months ago
Obligations and Their Interaction with Programs
Obligations are pervasive in modern systems, often linked to access control decisions. We present a very general model of obligations as objects with state, and discuss its interac...
Daniel J. Dougherty, Kathi Fisler, Shriram Krishna...
ACSAC
2000
IEEE
14 years 4 days ago
Security Architecture for Federated Cooperative Information Systems
The paper describes the design and implementation of a security architecture for a Cooperative Information System implemented with CORBA technologies. We first define a role-based...
Pierre Bieber, D. Raujol, Pierre Siron
ACSAC
1999
IEEE
14 years 1 days ago
Napoleon: A Recipe for Workflow
This paper argues that Napoleon, a flexible, role-based access control (RBAC) modeling environment, is also a practical solution for enforcing business process control, or workflo...
Charles N. Payne, D. J. Thomsen, J. Bogle, Richard...
ACSAC
2006
IEEE
14 years 1 months ago
From Languages to Systems: Understanding Practical Application Development in Security-typed Languages
Security-typed languages are an evolving tool for implementing systems with provable security guarantees. However, to date, these tools have only been used to build simple “toyâ...
Boniface Hicks, Kiyan Ahmadizadeh, Patrick Drew Mc...
ICWS
2009
IEEE
13 years 5 months ago
Identity Attribute-Based Role Provisioning for Human WS-BPEL Processes
The WS-BPEL specification focuses on business processes the activities of which are assumed to be interactions with Web services. However, WS-BPEL processes go beyond the orchestr...
Federica Paci, Rodolfo Ferrini, Elisa Bertino