Sciweavers

TMM
2002
133views more  TMM 2002»
13 years 4 months ago
A model for secure multimedia document database system in a distributed environment
Abstract--The Internet provides a universal platform for largescale distribution of information and supports inter-organizational services, system integration, and collaboration. U...
James B. D. Joshi, Zhaohui Kevin Li, Husni Fahmi, ...
SP
2002
IEEE
200views Security Privacy» more  SP 2002»
13 years 4 months ago
Design of a Role-Based Trust-Management Framework
We introduce the RT framework, a family of Rolebased Trust-management languages for representing policies and credentials in distributed authorization. RT combines the strengths o...
Ninghui Li, John C. Mitchell, William H. Winsborou...
SAJ
2002
92views more  SAJ 2002»
13 years 4 months ago
An access control architecture for XML documents in workflow environments
The eXtensible Markup Language (XML) are being upheld as having the potential to change the way business is conducted. This will be effected by changing the way in which informati...
Reinhardt A. Botha, Jan H. P. Eloff
JIIS
2002
118views more  JIIS 2002»
13 years 4 months ago
Authorization and Access Control of Application Data in Workflow Systems
: Workflow Management Systems (WfMSs) are used to support the modeling and coordinated execution of business processes within an organization or across organizational boundaries. A...
Shengli Wu, Amit P. Sheth, John A. Miller, Zongwei...
IJISEC
2002
52views more  IJISEC 2002»
13 years 4 months ago
Securing SOAP e-services
Remote service invocation via HTTP and XML promises to become an important component of the Internet infrastructure. Work is ongoing in the W3C XML Protocol Working Group to define...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
CSCW
2002
ACM
13 years 4 months ago
A new dimension in access control: studying maintenance engineering across organizational boundaries
Inter-organizational cooperation has specific requirements for access control. The paper presents the results from a field study which looks at the cooperation between two enginee...
Gunnar Stevens, Volker Wulf
CN
2000
76views more  CN 2000»
13 years 4 months ago
Supporting reconfigurable security policies for mobile programs
Programming models that support code migration have gained prominence, mainly due to a widespread shift from stand-alone to distributed applications. Although appealing in terms o...
Brant Hashii, Scott Malabarba, Raju Pandey, Matt B...
CSSE
2004
IEEE
13 years 4 months ago
AdOrBAC: an administration model for Or-BAC
Even though the final objective of an access control model is to provide a framework to decide if actions performed by subjects on objects are permitted or not, it is not convenie...
Frédéric Cuppens, Alexandre Mi&egrav...
CSSE
2004
IEEE
13 years 4 months ago
A comparison of modeling strategies in defining XML-based access control languages
One of the most important features of XML-based Web services is that they can be easily accessed over the Internet, but this makes them vulnerable to a series of security threats....
Claudio Agostino Ardagna, Sabrina De Capitani di V...
JSW
2007
106views more  JSW 2007»
13 years 4 months ago
Supporting Attribute-based Access Control in Authorization and Authentication Infrastructures with Ontologies
Abstract— In highly open systems like the Internet, attributebased access control (ABAC) has proven its appropriateness. This is reflected in the utilization of ABAC in authenti...
Torsten Priebe, Wolfgang Dobmeier, Christian Schl&...