Sciweavers

422 search results - page 7 / 85
» Risk management for distributed authorization
Sort
View
WETICE
1998
IEEE
13 years 11 months ago
Authorization and Attribute Certificates for Widely Distributed Access Control
We describe a system whose purpose is to explore the use of certificates for the distributed management of access rights for resources that have multiple, independent, and geograp...
William E. Johnston, Srilekha Mudumbai, Mary R. Th...
GSEM
2007
Springer
14 years 1 months ago
A Policy Language for Integrating Heterogeneous Authorization Policies
In order to manage and enforce multiple heterogeneous authorization policies in distributed authorization environment, we defined the root policy specification language and its cor...
Wei Zhou, Christoph Meinel
CCS
2005
ACM
14 years 28 days ago
PeerAccess: a logic for distributed authorization
This paper introduces the PeerAccess framework for reasoning about authorization in open distributed systems, and shows how a parameterization of the framework can be used to reas...
Marianne Winslett, Charles C. Zhang, Piero A. Bona...
CCS
2007
ACM
14 years 1 months ago
Alpaca: extensible authorization for distributed services
Traditional Public Key Infrastructures (PKI) have not lived up to their promise because there are too many ways to define PKIs, too many cryptographic primitives to build them wi...
Chris Lesniewski-Laas, Bryan Ford, Jacob Strauss, ...
COLCOM
2008
IEEE
14 years 1 months ago
Supporting Agile Development of Authorization Rules for SME Applications
Custom SME applications for collaboration and workflow have become affordable when implemented as Web applications employing Agile methodologies. Security engineering is still di...
Steffen Bartsch, Karsten Sohr, Carsten Bormann