Sciweavers

73 search results - page 10 / 15
» dbsec 2007
Sort
View
DBSEC
2006
134views Database» more  DBSEC 2006»
13 years 8 months ago
Notarized Federated Identity Management for Web Services
We propose a notarized federated identity management model that supports efficient user authentication when providers are unknown to each other. Our model introduces a notary servi...
Michael T. Goodrich, Roberto Tamassia, Danfeng Yao
DBSEC
2006
134views Database» more  DBSEC 2006»
13 years 8 months ago
Aggregation Queries in the Database-As-a-Service Model
In the Database-As-a-Service (DAS) model, clients store their database contents at servers belonging to potentially untrusted service providers. To maintain data confidentiality, ...
Einar Mykletun, Gene Tsudik
DBSEC
2006
122views Database» more  DBSEC 2006»
13 years 8 months ago
A Framework for Flexible Access Control in Digital Library Systems
Traditional access control models are often found to be inadequate for digital libraries. This is because the user population for digital libraries is very dynamic and not complete...
Indrajit Ray, Sudip Chakraborty
DBSEC
2006
124views Database» more  DBSEC 2006»
13 years 8 months ago
Consolidating the Access Control of Composite Applications and Workflows
The need for enterprise application integration projects leads to complex composite applications. For the sake of security and efficiency, consolidated access control policies for ...
Martin Wimmer, Alfons Kemper, Maarten Rits, Volkma...
DBSEC
2006
115views Database» more  DBSEC 2006»
13 years 8 months ago
Creating Objects in the Flexible Authorization Framework
Access control is a crucial concern to build secure IT systems and, more specifically, to protect the confidentiality of information. However, access control is necessary, but not ...
Nicola Zannone, Sushil Jajodia, Duminda Wijesekera