Sciweavers

715 search results - page 6 / 143
» Integration of Access Control in Information Systems: From R...
Sort
View
PERCOM
2006
ACM
14 years 7 months ago
Exploiting information relationships for access control in pervasive computing
Many information services in pervasive computing offer rich information, which is information that includes other types of information. For example, the information listed in a pe...
Urs Hengartner, Peter Steenkiste
SAC
2008
ACM
13 years 6 months ago
Web service access management for integration with agent systems
The agent paradigm includes the notion that agents interact with services. This paper identifies the need for controlled access to such services, from the perspective of agent sys...
Benno J. Overeinder, P. D. Verkaik, Frances M. T. ...
SACMAT
2003
ACM
14 years 18 days ago
Cryptographic access control in a distributed file system
Traditional access control mechanisms rely on a reference monitor to mediate access to protected resources. Reference monitors are inherently centralized and existing attempts to ...
Anthony Harrington, Christian Damsgaard Jensen
USS
2010
13 years 5 months ago
Baaz: A System for Detecting Access Control Misconfigurations
Maintaining correct access control to shared resources such as file servers, wikis, and databases is an important part of enterprise network management. A combination of many fact...
Tathagata Das, Ranjita Bhagwan, Prasad Naldurg
DEBU
2002
112views more  DEBU 2002»
13 years 7 months ago
Architecture and Implementation of an XQuery-based Information Integration Platform
An increasing number of business users and software applications need to process information that is accessible via multiple diverse information systems, such as database systems,...
Yannis Papakonstantinou, Vasilis Vassalos