Sciweavers

1073 search results - page 6 / 215
» Secure context-sensitive authorization
Sort
View
CCS
2005
ACM
14 years 1 months ago
Risk assessment in distributed authorization
Peter C. Chapin, Christian Skalka, Xiaoyang Sean W...
CSFW
1999
IEEE
14 years 2 days ago
A Logic-based Knowledge Representation for Authorization with Delegation
Ninghui Li, Joan Feigenbaum, Benjamin N. Grosof
IASTEDSE
2004
13 years 9 months ago
An authorization and access control scheme for pervasive computing
The existence of a central security authority is too restrictive for pervasive computing environments. Existing distributed security schemes fail in a pervasive computing environm...
Linda Staffans, Titos Saridakis
EUROPKI
2007
Springer
14 years 1 months ago
Authorization Architectures for Privacy-Respecting Surveillance
Even more than in our physical world, in our digital world we need systems that meet the security objective of service providers and users in equal measure. This paper investigates...
Ulrich Flegel, Michael Meier