Sciweavers

715 search results - page 86 / 143
» On Run-Time Enforcement of Policies
Sort
View
IEEEARES
2009
IEEE
14 years 2 months ago
Enhancing Control of Service Compositions in Service-Oriented Architectures
In a service-oriented architecture, service compositions are assembled from other component services. Such compositions may include services from unknown and potentially untrusted...
Christian Schneider, Frederic Stumpf, Claudia Ecke...
AOSD
2010
ACM
14 years 1 months ago
A permission system for secure AOP
The integration of third-party aspects into applications creates security challenges. Due to the intrusive impact of aspects, one cannot guarantee that the dynamic composition of ...
Wouter De Borger, Bart De Win, Bert Lagaisse, Wout...
ESORICS
2006
Springer
13 years 11 months ago
Delegation in Role-Based Access Control
User delegation is a mechanism for assigning access rights available to a user to another user. A delegation operation can either be a grant or transfer operation. Delegation for r...
Jason Crampton, Hemanth Khambhammettu
DBSEC
2010
162views Database» more  DBSEC 2010»
13 years 9 months ago
Distributed and Secure Access Control in P2P Databases
The intent of peer data management systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to...
Angela Bonifati, Ruilin Liu, Hui (Wendy) Wang
USS
2004
13 years 9 months ago
Design of the EROS Trusted Window System
Window systems are the primary mediator of user input and output in modern computing systems. They are also a commonly used interprocess communication mechanism. As a result, they...
Jonathan S. Shapiro, John Vanderburgh, Eric Northu...