Sciweavers

1627 search results - page 5 / 326
» On context in authorization policy
Sort
View
ESORICS
2010
Springer
13 years 8 months ago
An Authorization Framework Resilient to Policy Evaluation Failures
Abstract. In distributed computer systems, it is possible that the evaluation of an authorization policy may suffer unexpected failures, perhaps because a sub-policy cannot be eval...
Jason Crampton, Michael Huth
POLICY
2001
Springer
13 years 12 months ago
Author Obliged to Submit Paper before 4 July: Policies in an Enterprise Specification
Specifying policies doesn’t occur in splendid isolation but as part of refining an enterprise specification. The roles, the tasks, and the business processes of an ODP community ...
James B. Cole, John Derrick, Zoran Milosevic, Kerr...
POLICY
2001
Springer
13 years 12 months ago
Translating Role-Based Access Control Policy within Context
Jean Bacon, Michael Lloyd, Ken Moody
GRID
2006
Springer
13 years 7 months ago
Using Workflow for Dynamic Security Context Management in Grid-based Applications
This paper presents ongoing research and current results on the development of flexible access control infrastructures for complex resource provisioning in Grid-based collaborativ...
Yuri Demchenko, Leon Gommans, Cees de Laat, Arie T...
EGOV
2003
Springer
14 years 21 days ago
South African e-Government Policy and Practices: A Framework to Close the Gap
E-government in South Africa has a particularly important historical and social context due to the legacy of apartheid. As a result, a ten year egovernment implementation horizon h...
Jonathan Trusler