Sciweavers

191 search results - page 14 / 39
» Specifying and Reasoning About Dynamic Access-Control Polici...
Sort
View
POLICY
2004
Springer
14 years 1 months ago
A Framework for Contractual Resource Sharing in Coalitions
We develop a framework for specifying and reasoning about policies for sharing resources in coalitions, focussing here on a particular, common type of contract in which coalition ...
Babak Sadighi Firozabadi, Marek J. Sergot, Anna Ci...
CCS
2007
ACM
14 years 1 months ago
Specifying and analyzing security automata using CSP-OZ
Security automata are a variant of B¨uchi automata used to specify security policies that can be enforced by monitoring system execution. In this paper, we propose using CSP-OZ, ...
David A. Basin, Ernst-Rüdiger Olderog, Paul E...
EUROMICRO
2003
IEEE
14 years 29 days ago
Enforcing a lips Usage Policy for CORBA Components
Software components promise easy reuse, dependability, and simplified development. Problems arise when implicit assumptions about the use of the component are encoded in the imple...
Wayne DePrince Jr., Christine Hofmeister
CL
2010
Springer
13 years 7 months ago
Isolating untrusted software extensions by custom scoping rules
In a modern programming language, scoping rules determine the visibility of names in various regions of a program [15]. In this work, we examine the idea of allowing an applicatio...
Philip W. L. Fong, Simon A. Orr
ETRICS
2006
13 years 11 months ago
Optimized Workflow Authorization in Service Oriented Architectures
Abstract. Complex business processes are usually realized by specifying the integration and interaction of smaller modular software components. For example, hitherto monolithic ent...
Martin Wimmer, Martina-Cezara Albutiu, Alfons Kemp...