Sciweavers

14 search results - page 1 / 3
» dbsec 2006
Sort
View
DBSEC
2006
73views Database» more  DBSEC 2006»
13 years 6 months ago
Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems
Saket Kaushik, William H. Winsborough, Duminda Wij...
DBSEC
2006
107views Database» more  DBSEC 2006»
13 years 6 months ago
From Business Process Choreography to Authorization Policies
Abstract. A choreography specifies the interactions between the resources of multiple collaborating parties at design time. The runtime management of authorization policies in orde...
Philip Robinson, Florian Kerschbaum, Andreas Schaa...
DBSEC
2006
144views Database» more  DBSEC 2006»
13 years 6 months ago
Policy Classes and Query Rewriting Algorithm for XML Security Views
Most state-of-the-art approaches of securing XML documents are based on a partial annotation of an XML tree with security labels which are later propagated to unlabeled nodes of th...
Nataliya Rassadko
DBSEC
2006
122views Database» more  DBSEC 2006»
13 years 6 months ago
Term Rewriting for Access Control
We demonstrate how access control models and policies can be represented by using term rewriting systems, and how rewriting may be used for evaluating access requests and for provi...
Steve Barker, Maribel Fernández