Grid computing systems that have been the focus of much research activities in recent years provide a virtual framework for controlled sharing of resources across institutional bo...
Controlling access to resources is one of the most important protection goals for web-based services in practice. In general, access control requires identification of subjects t...
This paper presents a framework for verifying the access control requirements of real-time application systems such as workflow management systems and active databases. The tempor...
Basit Shafiq, Ammar Masood, James Joshi, Arif Ghaf...
We present a new static analysis for reviewing the security of libraries for systems, such as JVMs or the CLR, that rely on stack inspection for access control. We describe its im...
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions...