Sciweavers

4118 search results - page 6 / 824
» Mechanisms for usage control
Sort
View
ACSAC
2006
IEEE
14 years 2 months ago
A Study of Access Control Requirements for Healthcare Systems Based on Audit Trails from Access Logs
In healthcare, role-based access control systems are often extended with exception mechanisms to ensure access to needed informationeven when the needs don’t followthe expected ...
Lillian Røstad, Ole Edsberg
WISE
2005
Springer
14 years 2 months ago
Peer-to-Peer Technology Usage in Web Service Discovery and Matchmaking
This paper presents a dynamic and scalable mechanism for discovery of semantically enriched descriptions of Web services. By employing Web Service Modeling Ontology (WSMO) as the u...
Brahmananda Sapkota, Laurentiu Vasiliu, Ioan Toma,...
DBSEC
2007
121views Database» more  DBSEC 2007»
13 years 9 months ago
XACML Policies for Exclusive Resource Usage
The extensible access control markup language (XACML) is the standard access control policy specification language of the World Wide Web. XACML does not provide exclusive accesse...
Vijayant Dhankhar, Saket Kaushik, Duminda Wijeseke...
TRUSTBUS
2007
Springer
14 years 2 months ago
Usage Control in Service-Oriented Architectures
Usage control governs the handling of sensitive data after it has been given away. The enforcement of usage control requirements is a challenge because the service requester in gen...
Alexander Pretschner, Fabio Massacci, Manuel Hilty
OOPSLA
2001
Springer
14 years 25 days ago
Portable Resource Control in Java: The J-SEAL2 Approach
Preventing abusive resource consumption is indispensable for all kinds of systems that execute untrusted mobile code, such as mobile object systems, extensible web servers, and we...
Walter Binder, Jarle Hulaas, Alex Villazón