Sciweavers

1627 search results - page 14 / 326
» On context in authorization policy
Sort
View
GCC
2004
Springer
14 years 26 days ago
XML Based X.509 Authorization in CERNET Grid
: This paper presents an authorization solution for resource management and control developing as a part of the China Education and Research Network (CERNET) to perform fine-graine...
Wu Liu, Jianping Wu, Hai-Xin Duan, Xing Li, Ping R...
SDMW
2005
Springer
14 years 29 days ago
An Authorization Framework for Sharing Data in Web Service Federations
In this paper we present our authorization framework that supports the dynamic set-up of Web service federations for sharing data within virtual federations. Building on previous w...
Martin Wimmer, Alfons Kemper
IASTEDSE
2004
13 years 9 months ago
An authorization and access control scheme for pervasive computing
The existence of a central security authority is too restrictive for pervasive computing environments. Existing distributed security schemes fail in a pervasive computing environm...
Linda Staffans, Titos Saridakis
CSFW
2007
IEEE
13 years 11 months ago
A Type Discipline for Authorization in Distributed Systems
We consider the problem of statically verifying the conformance of the code of a system to an explicit authorization policy. In a distributed setting, some part of the system may ...
Cédric Fournet, Andy Gordon, Sergio Maffeis
IADIS
2008
13 years 9 months ago
E-Learning In The Field Of E-Business Support
E-business is one important element promoting business competitiveness and is thus closely linked to innovation. However, the potentials of ICT for business processes are not yet ...
Elisabeth Mendoza