Sciweavers

1073 search results - page 7 / 215
» Secure context-sensitive authorization
Sort
View
AINA
2007
IEEE
14 years 2 months ago
Enforcing Fine-Grained Authorization Policies for Java Mobile Agents
The Mobile Agent (MA) paradigm advocates the migration of agent code to achieve computational goals. MAs require an executable environment on hosts where mobile code can be execut...
Giovanni Russello, Changyu Dong, Naranker Dulay
APLAS
2006
ACM
14 years 1 months ago
A Practical String Analyzer by the Widening Approach
The static determination of approximated values of string expressions has many potential applications. For instance, approximated string values may be used to check the validity an...
Tae-Hyoung Choi, Oukseh Lee, Hyunha Kim, Kyung-Goo...
CORR
2010
Springer
157views Education» more  CORR 2010»
13 years 7 months ago
Certification Authority Monitored Multilevel and Stateful Policy Based Authorization in Services Oriented Grids
Services oriented grids will be more prominent among other kinds of grids in the present distributed environments. With the advent of online government services the governmental g...
Ajay Prasad, Saurabh Singh Verma, Ashok Kumar Shar...
PERCOM
2005
ACM
14 years 7 months ago
Secure context-sensitive authorization
There is a recent trend toward rule-based authorization systems to achieve flexible security policies. Also, new sensing technologies in pervasive computing make it possible to de...
Kazuhiro Minami, David Kotz
ACSAC
1999
IEEE
14 years 2 days ago
User Authentication and Authorization in the Java(tm) Platform
JavaTM security technology originally focused on creating a safe environment in which to run potentially untrusted code downloaded from the public network. With the latest release...
Charlie Lai, Li Gong, Larry Koved, Anthony J. Nada...