Sciweavers

318 search results - page 54 / 64
» Policy Based Management for Critical Infrastructure Protecti...
Sort
View
SACMAT
2010
ACM
14 years 11 days ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
ACSAC
1999
IEEE
13 years 12 months ago
Tools to Support Secure Enterprise Computing
Secure enterprise programming is a difficult and tedious task. Programmers need tools that support t levels of abstraction and that track all the components that participate in di...
Myong H. Kang, Brian J. Eppinger, Judith N. Frosch...
SIGMOD
2010
ACM
227views Database» more  SIGMOD 2010»
14 years 11 days ago
SecureBlox: customizable secure distributed data processing
We present SecureBlox, a declarative system that uniļ¬es a distributed query processor with a security policy framework. SecureBlox decouples security concerns from system speciļ...
William R. Marczak, Shan Shan Huang, Martin Braven...
WWW
2006
ACM
14 years 8 months ago
WS-replication: a framework for highly available web services
Due to the rapid acceptance of web services and its fast spreading, a number of mission-critical systems will be deployed as web services in next years. The availability of those ...
Jorge Salas, Francisco Perez-Sorrosal, Marta Pati&...
DRM
2003
Springer
14 years 23 days ago
Constructing a virtual primary key for fingerprinting relational data
Agrawal and Kiernanā€™s watermarking technique for database relations [1] and Li et alā€™s ļ¬ngerprinting extension [6] both depend critically on primary key attributes. Hence, t...
Yingjiu Li, Vipin Swarup, Sushil Jajodia