Sciweavers

579 search results - page 83 / 116
» Policies, Models, and Languages for Access Control
Sort
View
ICIW
2008
IEEE
14 years 2 months ago
Leveraging Integrated Tools for Model-Based Analysis of Service Compositions
—Developing service compositions, using multiple standards and implementation techniques, typically involves specifying service characteristics in different languages and tools. ...
Howard Foster, Philip Mayer
FASE
2008
Springer
13 years 9 months ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu
GCC
2004
Springer
14 years 1 months ago
XML Based X.509 Authorization in CERNET Grid
: This paper presents an authorization solution for resource management and control developing as a part of the China Education and Research Network (CERNET) to perform fine-graine...
Wu Liu, Jianping Wu, Hai-Xin Duan, Xing Li, Ping R...
PLDI
2006
ACM
14 years 1 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober
MDM
2001
Springer
148views Communications» more  MDM 2001»
14 years 2 days ago
An Agent-Based Architecture Using XML for Mobile Federated Database Systems
We advocate the use of agents to model a system that allows us to integrate and protect information stored in both mobile and fixed devices, while trying to preserve a consistent a...
Carlos Sánchez, Le Gruenwald