Sciweavers

1073 search results - page 85 / 215
» Secure context-sensitive authorization
Sort
View
105
Voted
IADIS
2004
15 years 3 months ago
Security Assertion Exchange for the Agent on the Semantic Web
The Semantic Web's success will depend on the implementation and use of Web Service becoming preeminent in Ecommerce, which will likely be agent-based in the future. On the S...
Joo-Young Lee, Ki-Young Moon
DBSEC
2001
129views Database» more  DBSEC 2001»
15 years 3 months ago
Secure Role-Based Workflow Models
: In this paper we introduce a series of reference models for Secure Role-Based Workflow systems. We build our models over the well-known RBAC96 framework. 96 model supports the no...
Savith Kandala, Ravi S. Sandhu
IJMMS
2007
103views more  IJMMS 2007»
15 years 2 months ago
Improving password security and memorability to protect personal and organizational information
Personal information and organizational information need to be protected, which requires that only authorized users gain access to the information. The most commonly used method f...
Kim-Phuong L. Vu, Robert W. Proctor, Abhilasha Bha...
CSFW
2008
IEEE
15 years 8 months ago
A Trust Management Approach for Flexible Policy Management in Security-Typed Languages
Early work on security-typed languages required that legal information flows be defined statically. More recently, techniques have been introduced that relax these assumptions a...
Sruthi Bandhakavi, William H. Winsborough, Mariann...
ICIW
2007
IEEE
15 years 8 months ago
A New Security Scheme for Integration of Mobile Agents and Web Services
Web services specification provides an open standard for the distributed service oriented architecture. It is widely used in Internet and pervasive networks supporting wireless m...
Junqi Zhang, Yan Wang 0002, Vijay Varadharajan