Sciweavers

860 search results - page 123 / 172
» On the Security of Delegation in Access Control Systems
Sort
View
IEEEARES
2008
IEEE
14 years 2 months ago
Static Validation of Licence Conformance Policies
Policy conformance is a security property gaining importance due to commercial interest like Digital Rights Management. It is well known that static analysis can be used to valida...
René Rydhof Hansen, Flemming Nielson, Hanne...
ETRICS
2006
13 years 11 months ago
Optimized Workflow Authorization in Service Oriented Architectures
Abstract. Complex business processes are usually realized by specifying the integration and interaction of smaller modular software components. For example, hitherto monolithic ent...
Martin Wimmer, Martina-Cezara Albutiu, Alfons Kemp...
NSPW
2006
ACM
14 years 1 months ago
Inconsistency in deception for defense
The use of deception is one of many defensive techniques being explored today. In the past, defenders of systems have used deception haphazardly, but now researchers are developin...
Vicentiu Neagoe, Matt Bishop
ACSAC
2002
IEEE
14 years 18 days ago
Thirty Years Later: Lessons from the Multics Security Evaluation
Almost thirty years ago a vulnerability assessment of Multics identified significant vulnerabilities, despite the fact that Multics was more secure than other contemporary (and cu...
Paul A. Karger, Roger R. Schell
ICIAP
2001
Springer
14 years 7 months ago
Eigenspace-Based Recognition of Faces: Comparisons and a New Approach
Different eigenspace-based approaches have been proposed for the recognition of faces. They differ mostly in the kind of projection method been used and in the similarity matching ...
Pablo Navarrete, Javier Ruiz-del-Solar