Sciweavers

1627 search results - page 7 / 326
» On context in authorization policy
Sort
View
VLDB
2007
ACM
160views Database» more  VLDB 2007»
14 years 1 months ago
Over-encryption: Management of Access Control Evolution on Outsourced Data
Data outsourcing is emerging today as a successful paradigm allowing users and organizations to exploit external services for the distribution of resources. A crucial problem to b...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
POLICY
2007
Springer
14 years 1 months ago
Policy-Driven Negotiation for Authorization in the Grid
In many Grid services deployments, the clients and servers reside in different administrative domains. Hence, there is a requirement both to discover each other’s authorization ...
Ionut Constandache, Daniel Olmedilla, Frank Sieben...
ACSAC
2001
IEEE
13 years 11 months ago
The Authorization Service of Tivoli Policy Director
This paper presents the Authorization Service provided by Tivoli Policy Director (PD) and its use by PD family members as well as third-party applications. Policies are defined ov...
Günter Karjoth
ESOP
2010
Springer
14 years 4 months ago
Enforcing Stateful Authorization and Information Flow Policies in Fine
Proving software free of security bugs is hard. Languages that ensure that programs correctly enforce their security policies would help, but, to date, no security-typed language h...
Nikhil Swamy, Juan Chen and Ravi Chugh
IEEEARES
2010
IEEE
13 years 11 months ago
Supporting Authorization Policy Modification in Agile Development of Web Applications
Web applications are increasingly developed in Agile development processes. Business-centric Web applications need complex authorization policies to securely implement business pro...
Steffen Bartsch