Sciweavers

3712 search results - page 151 / 743
» Role-Based Access Control
Sort
View
NDSS
2003
IEEE
14 years 3 months ago
Access Control Based on Execution History
Security is a major, frequent concern in extensible software systems such as Java Virtual Machines and the Common Language Runtime. These systems aim to enable simple, classic app...
Martín Abadi, Cédric Fournet
XMLSEC
2003
ACM
14 years 3 months ago
RDF metadata for XML access control
ÁÒ Ø × Ô Ô Ö Û ÔÖ × ÒØ Ò ×× ÓÒØÖÓÐ Ö Ñ ÛÓÖ Ø Ø ÔÖÓÚ × ­ Ü Ð × ÙÖ ØÝ Ö ÒÙÐ Ö ØÝ ÓÖ ÅÄ Ó ÙÑ ÒØ׺ Ê ×Ø Ø Ñ ÒØ× Ö ...
Vaibhav Gowadia, Csilla Farkas
ASIAN
2003
Springer
121views Algorithms» more  ASIAN 2003»
14 years 3 months ago
Paradigm Regained: Abstraction Mechanisms for Access Control
Mark S. Miller, Jonathan S. Shapiro
CCS
2003
ACM
14 years 3 months ago
Formal access control analysis in the software development process
Security is a crucial aspect in any modern software system. To ensure security in the final product, security requirements must be considered in the entire software development p...
Manuel Koch, Francesco Parisi-Presicce
CCS
2003
ACM
14 years 3 months ago
XML access control using static analysis
Makoto Murata, Akihiko Tozawa, Michiharu Kudo, Sat...