Authorization policy infrastructures are evolving with the complex environments that they support. However, the requirements and technologies supporting context are not yet well u...
Abstract. Language-based security leverages program analysis and program rewriting to enforce security policies. The approach promises efficient enforcement of fine-grained access ...
Fred B. Schneider, J. Gregory Morrisett, Robert Ha...
Controlled Query Evaluation (CQE) is a logical framework for the protection of secrets in databases. In this article, we extend the CQE framework to possibilistic logic: knowledge ...
Extensible systems, such as Java or the SPIN extensible operating system, allow for units of code, or extensions, to be added to a running system in almost arbitrary fashion. Exte...
In this paper we propose a security architecture for Virtual Organizations for businesses. The Virtual Organizations we consider are based on web service technology to address int...
Rafael Deitos, Florian Kerschbaum, Philip Robinson