Sciweavers

1627 search results - page 89 / 326
» On context in authorization policy
Sort
View
EDUTAINMENT
2006
Springer
14 years 1 months ago
Reviewing the Potential of Virtual Learning Environments in Schools
This paper considers the potential of Virtual Learning Environments in schools focusing on 2 distinct user groups. Firstly, the children and teachers engaged in the learning situat...
Malcolm Padmore, Lynne E. Hall, Bob Hogg, Gareth P...
CSFW
2009
IEEE
14 years 4 months ago
Achieving Security Despite Compromise Using Zero-knowledge
One of the important challenges when designing and analyzing cryptographic protocols is the enforcement of security properties in the presence of compromised participants. This pa...
Michael Backes, Martin P. Grochulla, Catalin Hritc...
FUIN
2002
63views more  FUIN 2002»
13 years 9 months ago
Probabilistic Cluster Unfoldings
Abstract. This article introduces probabilistic cluster branching processes, a probabilistic unfolding semantics for untimed Petri nets, with no structural or safety assumptions, g...
Stefan Haar
SP
2002
IEEE
200views Security Privacy» more  SP 2002»
13 years 9 months ago
Design of a Role-Based Trust-Management Framework
We introduce the RT framework, a family of Rolebased Trust-management languages for representing policies and credentials in distributed authorization. RT combines the strengths o...
Ninghui Li, John C. Mitchell, William H. Winsborou...
CCS
2010
ACM
14 years 4 months ago
Toward practical authorization-dependent user obligation systems
Many authorization system models include some notion of obligation. Little attention has been given to user obligations that depend on and affect authorizations. However, to be u...
Murillo Pontual, Omar Chowdhury, William H. Winsbo...