Sciweavers

422 search results - page 12 / 85
» Risk management for distributed authorization
Sort
View
ECOOPW
1999
Springer
14 years 22 days ago
The Role of Trust Management in Distributed Systems Security
Existing authorization mechanisms fail to provide powerful and robust tools for handling security at the scale necessary for today's Internet. These mechanisms are coming unde...
Matt Blaze, Joan Feigenbaum, Angelos D. Keromytis
ENTCS
2008
130views more  ENTCS 2008»
13 years 8 months ago
The SPARTA Pseudonym and Authorization System
This paper deals with privacy-preserving (pseudonymized) access to a service resource. In such a scenario, two opposite needs seem to emerge. On one side, the service provider may...
Giuseppe Bianchi, M. Bonola, Vincenzo Falletta, Fr...
FC
2007
Springer
122views Cryptology» more  FC 2007»
14 years 2 months ago
Mental Models of Security Risks
1 2 There is a critical need in computer security to communicate risks and thereby enable informed decisions by naive users. Yet computer security has not been engaged with the sc...
Farzaneh Asgharpour, Debin Liu, L. Jean Camp
SIGIR
2006
ACM
14 years 2 months ago
You are what you say: privacy risks of public mentions
In today’s data-rich networked world, people express many aspects of their lives online. It is common to segregate different aspects in different places: you might write opinion...
Dan Frankowski, Dan Cosley, Shilad Sen, Loren G. T...
WWW
2003
ACM
14 years 9 months ago
An Application for WebDAV-based Authoring of Databases - WebDAD
We propose a new approach to accessing databases through the Web that is based on the WebDAV protocol (Web-based Distributed Authoring and Versioning). This paper introduces an ex...
Bita Shadgar, Ian Holyer