Sciweavers

804 search results - page 80 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
BPM
2006
Springer
149views Business» more  BPM 2006»
15 years 6 months ago
Verifying BPEL Workflows Under Authorisation Constraints
Abstract. Business Process Execution Language (BPEL), or Web Services BPEL (WS-BPEL), is the standard for specifying workflow process definition using web services. Research on for...
Zhao Xiangpeng, Antonio Cerone, Padmanabhan Krishn...
RBAC
1998
101views more  RBAC 1998»
15 years 6 months ago
An Oracle Implementation of the PRA97 Model for Permission-Role Assignment
In role-based access control RBAC permissions are associated with roles, and users are made members of appropriate roles thereby acquiring the roles' permissions. Using RBAC ...
Ravi S. Sandhu, Venkata Bhamidipati
ENTCS
2006
123views more  ENTCS 2006»
15 years 4 months ago
Nonmonotonic Trust Management for P2P Applications
Community decisions about access control in virtual communities are non-monotonic in nature. This means that they cannot be expressed in current, monotonic trust management langua...
Marcin Czenko, Ha Tran, Jeroen Doumen, Sandro Etal...
ESORICS
2011
Springer
14 years 4 months ago
Protecting Private Web Content from Embedded Scripts
Many web pages display personal information provided by users. The goal of this work is to protect that content from untrusted scripts that are embedded in host pages. We present a...
Yuchen Zhou, David Evans
MOBIQUITOUS
2007
IEEE
15 years 11 months ago
A Low-delay Protocol for Multihop Wireless Body Area Networks
—Wireless Body Area Networks (WBANs) form a new and interesting area in the world of remote health monitoring. An important concern in such networks is the communication between ...
Benoît Latré, Bart Braem, Ingrid Moer...