Sciweavers

189 search results - page 4 / 38
» Non-delegatable authorities in capability systems
Sort
View
WOWMOM
2006
ACM
191views Multimedia» more  WOWMOM 2006»
14 years 2 months ago
Privacy Preserving Trust Authorization Framework Using XACML
: Nowadays many organisations share sensitive services through open network systems and this raises the need for an authorization framework that can interoperate even when the part...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...
JUCS
2007
90views more  JUCS 2007»
13 years 8 months ago
Supporting the Authoring and Operationalization of Educational Modelling Languages
: The modelling of educational processes and their operational support is a key aspect in the construction of more effective e-learning applications. Instructional models are usual...
Iván Martínez-Ortiz, Pablo Moreno-Ge...
ICTAI
2009
IEEE
14 years 3 months ago
Managing Authorization Provenance: A Modal Logic Based Approach
Abstract—In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy langua...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
ICDCS
2003
IEEE
14 years 1 months ago
Integrated Access Control and Intrusion Detection for Web Servers
Current intrusion detection systems work in isolation from access control for the application the systems aim to protect. The lack of coordination and inter-operation between thes...
Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim, L...
C5
2008
IEEE
14 years 3 months ago
SophieScript - Active Content in Multimedia Documents
Active content in multimedia documents helps the reader to grasp the implications of nonlinear and complex systems that are difficult to understand in a text-based description. T...
Jens Lincke, Robert Hirschfeld, Michael Rüger...