Sciweavers

39 search results - page 3 / 8
» An Algebraic Basis for Specifying and Enforcing Access Contr...
Sort
View
COLCOM
2007
IEEE
13 years 11 months ago
Secure peer-to-peer networks for trusted collaboration
Abstract—An overview of recent advances in secure peerto-peer networking is presented, toward enforcing data integrity, confidentiality, availability, and access control policie...
Kevin W. Hamlen, Bhavani M. Thuraisingham
ESORICS
2007
Springer
13 years 9 months ago
Pragmatic XML Access Control Using Off-the-Shelf RDBMS
As the XML model gets more popular, new needs arise to specify access control within XML model. Various XML access control models and enforcement methods have been proposed recentl...
Bo Luo, Dongwon Lee, Peng Liu
SP
1997
IEEE
134views Security Privacy» more  SP 1997»
13 years 9 months ago
A Logical Language for Expressing Authorizations
A major drawback of existing access control systems is that they have all been developed with a specific access control policy in mind. This means that all protection requirement...
Sushil Jajodia, Pierangela Samarati, V. S. Subrahm...
BIS
2008
86views Business» more  BIS 2008»
13 years 7 months ago
Specifying Separation of Duty Constraints in BPEL4People Processes
Abstract. Security issues have to be carefully considered for information systems that support the business processes of an organization, in particular, when these systems build on...
Jan Mendling, Karsten Ploesser, Mark Strembeck
WETICE
1996
IEEE
13 years 9 months ago
Role-based security for distributed object systems
This paper describes a security architecture designed to support role-based access control for distributed object systems in a large-scale, multi-organisational enterprise in whic...
Nicholas Yialelis, Emil Lupu, Morris Sloman