Sciweavers

164 search results - page 14 / 33
» On the Incoherencies in Web Browser Access Control Policies
Sort
View
ACSAC
2000
IEEE
13 years 11 months ago
Implementing Security Policies using the Safe Areas of Computation Approach
The World Wide Web is playing a major role in reducing business costs and in providing convenience to users. Digital Libraries capitalize on this technology to distribute document...
André L. M. dos Santos, Richard A. Kemmerer
SAC
2008
ACM
13 years 6 months ago
Web service access management for integration with agent systems
The agent paradigm includes the notion that agents interact with services. This paper identifies the need for controlled access to such services, from the perspective of agent sys...
Benno J. Overeinder, P. D. Verkaik, Frances M. T. ...
WWW
2006
ACM
14 years 8 months ago
pTHINC: a thin-client architecture for mobile wireless web
Although web applications are gaining popularity on mobile wireless PDAs, web browsers on these systems can be quite slow and often lack adequate functionality to access many web ...
Joeng Kim, Ricardo A. Baratto, Jason Nieh
SACMAT
2009
ACM
14 years 1 months ago
A semantic web based framework for social network access control
The existence of on-line social networks that include person specific information creates interesting opportunities for various applications ranging from marketing to community o...
Barbara Carminati, Elena Ferrari, Raymond Heatherl...
TOOLS
1998
IEEE
13 years 11 months ago
The Interaction of Access Control and Object-Orientation in Extensible Systems
In this paper we describe how object-oriented language design interacts with access control in extensible systems, based on our experience in building the SPIN extensible operatin...
Wilson C. Hsieh, Przemyslaw Pardyak, Marc E. Fiucz...