Sciweavers

1627 search results - page 10 / 326
» On context in authorization policy
Sort
View
SP
1997
IEEE
134views Security Privacy» more  SP 1997»
13 years 11 months ago
A Logical Language for Expressing Authorizations
A major drawback of existing access control systems is that they have all been developed with a specific access control policy in mind. This means that all protection requirement...
Sushil Jajodia, Pierangela Samarati, V. S. Subrahm...
CHI
2008
ACM
14 years 7 months ago
Expandable grids for visualizing and authoring computer security policies
We introduce the Expandable Grid, a novel interaction technique for creating, editing, and viewing many types of security policies. Security policies, such as file permissions pol...
Robert W. Reeder, Lujo Bauer, Lorrie Faith Cranor,...
AINA
2007
IEEE
14 years 1 months ago
Enforcing Fine-Grained Authorization Policies for Java Mobile Agents
The Mobile Agent (MA) paradigm advocates the migration of agent code to achieve computational goals. MAs require an executable environment on hosts where mobile code can be execut...
Giovanni Russello, Changyu Dong, Naranker Dulay
ESORICS
2007
Springer
14 years 1 months ago
A Logic for State-Modifying Authorization Policies
Moritz Y. Becker, Sebastian Nanz
ACISP
2006
Springer
14 years 1 months ago
Graphical Representation of Authorization Policies for Weighted Credentials
Isaac Agudo, Javier Lopez, José A. Monteneg...