Sciweavers

58 search results - page 3 / 12
» Policy-hiding access control in open environment
Sort
View
SACMAT
2005
ACM
13 years 11 months ago
Adaptive trust negotiation and access control
Electronic transactions regularly occur between business partners in separate security domains. Trust negotiation is an approach that provides an open authentication and access-co...
Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Travi...
HT
1996
ACM
13 years 9 months ago
The HyperDisco Approach to Open Hypermedia Systems
Computing support forlargeengineeringenterprisesprovides an example of the need for hypermedia-based collaborative computing systems composed of a large number of distributed hete...
Uffe Kock Wiil, John J. Leggett
WPES
2004
ACM
13 years 10 months ago
Hidden access control policies with hidden credentials
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather tha...
Keith B. Frikken, Mikhail J. Atallah, Jiangtao Li
WEBI
2004
Springer
13 years 10 months ago
An Access Control Model for Web Services in Business Process
Business process describes a set of services that span enterprise boundaries and are provided by enterprises that see each other as partners. Web services is widely accepted and a...
Peng Liu, Zhong Chen
ECIS
2000
13 years 6 months ago
Secure Access to Medical Data over the Internet
The concept of context-dependent access control has emerged during the last years: Information about the state of a process model of a working environment is combined with general ...
Ulrich Ultes-Nitsche, Stephanie Teufel