Sciweavers

296 search results - page 7 / 60
» Policies and Roles in Collaborative Applications
Sort
View
COLCOM
2008
IEEE
14 years 2 months ago
Supporting Agile Development of Authorization Rules for SME Applications
Custom SME applications for collaboration and workflow have become affordable when implemented as Web applications employing Agile methodologies. Security engineering is still di...
Steffen Bartsch, Karsten Sohr, Carsten Bormann
UIST
1997
ACM
13 years 11 months ago
Flexible Conflict Detection and Management in Collaborative Applications
This paper presents a comprehensive model for dealing with semantic conflicts in applications, and the implementation of this model in a toolkit for collaborative systems. Conflic...
W. Keith Edwards
ECOOPW
1998
Springer
13 years 12 months ago
Role-Based Protection and Delegation for Mobile Object Environments
PrincipalDomain is an administrative scoping construct for establishing security policies based on the principals invoking object services that may entail objects moving around a ...
Nataraj Nagaratnam, Doug Lea
WISA
2004
Springer
14 years 1 months ago
Inconsistency Detection of Authorization Policies in Distributed Component Environment
In distributed component environment, a Role-Based Access Control (RBAC) server manages all authorization policies of components in the same domains whereas the components are dist...
Chang-Joo Moon, Hoh Peter In
DGO
2009
118views Education» more  DGO 2009»
13 years 9 months ago
Towards collaborative web-based impact assessment
Impact assessment (IA) is a key method for the legislator to evaluate policies, norms or regulations currently under development. Experts use IA to gather and analyze input from m...
Clemens Heidinger, Erik Buchmann, Klemens Böh...