Sciweavers

1627 search results - page 133 / 326
» On context in authorization policy
Sort
View
WPES
2005
ACM
14 years 4 months ago
Privacy for RFID through trusted computing
Radio Frequency Identification (RFID) technology raises significant privacy issues because it enables tracking of items and people possibly without their knowledge or consent. O...
David Molnar, Andrea Soppera, David Wagner
XMLSEC
2003
ACM
14 years 3 months ago
An access control framework for business processes for web services
Business Processes for Web Services are the new paradigm for the lightweight integration of business from different enterprises. Whereas the security and access control policies ...
Hristo Koshutanski, Fabio Massacci
ICFP
2010
ACM
13 years 11 months ago
Security-typed programming within dependently typed programming
Several recent security-typed programming languages, such as Aura, PCML5, and Fine, allow programmers to express and enforce access control and information flow policies. Most of ...
Jamie Morgenstern, Daniel R. Licata
ESSOS
2010
Springer
14 years 7 months ago
Experiences with PDG-Based IFC
Information flow control systems provide the guarantees that are required in today’s security-relevant systems. While the literature has produced a wealth of techniques to ensur...
Christian Hammer
APSCC
2008
IEEE
14 years 4 months ago
Towards Service Supervision for Public Web Services
Public Web services are not designed to be used with specific other Web services in a composite Web service. This leads to the following requirements for the proper control of a ...
Masahiro Tanaka, Yohei Murakami, Toru Ishida