Sciweavers

581 search results - page 45 / 117
» policy 2009
Sort
View
ISW
2009
Springer
14 years 3 months ago
Privacy-Aware Attribute-Based Encryption with User Accountability
As a new public key primitive, attribute-based encryption (ABE) is envisioned to be a promising tool for implementing fine-grained access control. To further address the concern o...
Jin Li, Kui Ren, Bo Zhu, Zhiguo Wan
ESORICS
2009
Springer
14 years 9 months ago
PCAL: Language Support for Proof-Carrying Authorization Systems
By shifting the burden of proofs to the user, a proof-carrying authorization (PCA) system can automatically enforce complex access control policies. Unfortunately, managing those p...
Avik Chaudhuri, Deepak Garg
SOFSEM
2009
Springer
14 years 5 months ago
A Formal Model of Business Application Integration from Web Services (Position Paper)
Abstract. Currently there are many service providers on the Web. Industry recognizes that from Web services many different business applications can be quickly created. A Web servi...
Kaiyu Wan, Mubarak Mohammad, Vasu S. Alagar
AINA
2009
IEEE
14 years 3 months ago
Enabling Mobility between Context-Aware Smart Spaces
This paper presents “ConServ1 ”, a web service for context management. ConServ allows smart spaces to access user’s context data according to user-defined policies. This we...
Gearoid Hynes, Vinny Reynolds, Manfred Hauswirth
CSFW
2009
IEEE
14 years 3 months ago
Achieving Security Despite Compromise Using Zero-knowledge
One of the important challenges when designing and analyzing cryptographic protocols is the enforcement of security properties in the presence of compromised participants. This pa...
Michael Backes, Martin P. Grochulla, Catalin Hritc...