Sciweavers

1627 search results - page 34 / 326
» On context in authorization policy
Sort
View
EUROSYS
2007
ACM
14 years 4 months ago
Authorizing applications in singularity
We describe a new design for authorization in operating systems in which applications are first-class entities. In this design, principals reflect application identities. Access c...
Ted Wobber, Aydan R. Yumerefendi, Martín Ab...
MTA
2000
112views more  MTA 2000»
13 years 7 months ago
Interactive Multimedia Documents: A Modeling, Authoring and Rendering Approach
In this paper we present our research and development experience in the context of Interactive Multimedia Documents (IMDs). We define a rich model for such documents covering the ...
Michalis Vazirgiannis, D. Tsirikos, Th. Markousis,...
FIS
2010
13 years 5 months ago
An Authoring Tool for User Generated Mobile Services
Imagine what kind of applications become possible when our mobile devices not only present data but provide valuable information to other users. Users become able to instantaneousl...
José Danado, Marcin Davies, Paulo Ricca, An...
CCS
2006
ACM
13 years 11 months ago
Safety analysis of usage control authorization models
The usage control (UCON) model was introduced as a unified approach to capture a number of extensions for traditional access control models. While the policy specification flexibi...
Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Pre...
CCS
2008
ACM
13 years 9 months ago
Black-box accountable authority identity-based encryption
A well-known concern in the setting of identity based encryption is that the PKG is all powerful and has to be completely trusted. To mitigate this problem, the notion of Accounta...
Vipul Goyal, Steve Lu, Amit Sahai, Brent Waters