Sciweavers

2422 search results - page 108 / 485
» Security Policy Consistency
Sort
View
137
Voted
DBSEC
1998
115views Database» more  DBSEC 1998»
15 years 6 months ago
Secure Mediation: Requirements and Design
In this paper1 we discuss the security requirements for mediation, and present our approach towards satisfying them, with an emphasis on con dentiality and authenticity. Furthermo...
Joachim Biskup, Ulrich Flegel, Yücel Karabulu...
153
Voted
JCS
2010
124views more  JCS 2010»
15 years 3 months ago
Verifying resource access control on mobile interactive devices
A model of resource access control is presented in which the access control to resources can employ user interaction to obtain the necessary permissions. This model is inspired by...
Frédéric Besson, Guillaume Dufay, Th...
IEEEIAS
2008
IEEE
15 years 11 months ago
Developing a Security Typed Java Servlet
: The Lack of security policy enforcement in web development languages is one of the most important challenges in web application systems development, as there is no formal check f...
Doaa Hassan, Sherif El-Kassas, Ibrahim Ziedan
OSS
2007
Springer
15 years 10 months ago
Free/Open Source Software Adoption, Public Policies and Development Indicators: An International Comparison
Despite the growing body of research on inner workings of FOSS development, there are few studies on its relation with broader developments in society. In this study we have attemp...
Harald Schmidbauer, Mehmet Gençer, Vehbi Si...
ECIS
2003
15 years 6 months ago
Development of a security methodology for cooperative information systems: the cooPSIS project
Since networks and computing systems are vital components of today's life, it is of utmost importance to endow them with the capability to survive physical and logical faults...
Mariagrazia Fugini, Mario Mezzanzanica