Sciweavers

2422 search results - page 81 / 485
» Security Policy Consistency
Sort
View
IEEEARES
2010
IEEE
15 years 8 months ago
Supporting Authorization Policy Modification in Agile Development of Web Applications
Web applications are increasingly developed in Agile development processes. Business-centric Web applications need complex authorization policies to securely implement business pro...
Steffen Bartsch
ACSAC
1999
IEEE
15 years 8 months ago
A Prototype Secure Workflow Server
Workflow systems provide automated support that enables organizations to efficiently and reliably move important data through their routine business processes. For some organizati...
Douglas L. Long, Julie Baker, Francis Fung
ESORICS
1998
Springer
15 years 8 months ago
Rules for Designing Multilevel Object-Oriented Databases
When implementing a multilevel security policy for Object-Oriented Databases (OODBs), several aspects have to be investigated. One of these aspect is the design of multilevel OODB...
Frédéric Cuppens, Alban Gabillon
PDPTA
2003
15 years 5 months ago
Distributed Access Control for Carrier Class Clusters
The telecommunication industry traditionally uses clusters to meet its carrier-class requirements of high availability and reliability. As security has also become a major issue, ...
Makan Pourzandi, Axelle Apvrille, E. Gingras, A. M...
CCS
2010
ACM
15 years 11 months ago
A lattice-based approach to mashup security
A web mashup is a web application that integrates content from different providers to create a new service, not offered by the content providers. As mashups grow in popularity, ...
Jonas Magazinius, Aslan Askarov, Andrei Sabelfeld