Sciweavers

IEEECIT
2010
IEEE
13 years 3 months ago
Virtual Security Kernel: A Component-Based OS Architecture for Self-Protection
—This paper presents VSK, a lightweight adaptable OS authorization architecture suitable for self-protection of pervasive devices. A “virtual” management plane, separate from...
Ruan He, Marc Lacoste, Jean Leneutre
JCS
2007
103views more  JCS 2007»
13 years 4 months ago
Risk management for distributed authorization
Distributed authorization takes into account several elements, including certificates that may be provided by non-local actors. While most trust management systems treat all asse...
Christian Skalka, Xiaoyang Sean Wang, Peter C. Cha...
JSW
2008
101views more  JSW 2008»
13 years 4 months ago
Implicit Authorization for Social Location Disclosure
Being increasingly equipped with highly-accurate positioning technologies, today's mobile phones enable their owners to transmit their current position over the cellular netwo...
Georg Treu, Florian Fuchs, Christiane Dargatz
GRID
2006
Springer
13 years 4 months ago
ROAM: An Authorization Manager for Grids
The Resource Oriented Authorization Manager (ROAM) was created to provide a simple but flexible authorization system for the FusionGrid computational grid. ROAM builds on and exte...
Justin Burruss, T. W. Fredian, Mary R. Thompson
ICWS
2004
IEEE
13 years 6 months ago
Web Service Authorization Framework
Web Services represent an important technology for distributed applications and will replace various other technologies for distributed application development soon. A lot of prob...
Thomas Ziebermayr, Stefan Probst
ACSAC
2001
IEEE
13 years 8 months ago
The Authorization Service of Tivoli Policy Director
This paper presents the Authorization Service provided by Tivoli Policy Director (PD) and its use by PD family members as well as third-party applications. Policies are defined ov...
Günter Karjoth
ACSAC
2001
IEEE
13 years 8 months ago
A Framework for Multiple Authorization Types in a Healthcare Application System
In most of the current authorization frameworks in application systems, the authorization for a user operation is determined using a static database like ACL entries or system tab...
Ramaswamy Chandramouli
ESCIENCE
2006
IEEE
13 years 8 months ago
Authorizing Remote Job Execution Based on Job Properties
: E-Science often requires access to remote Grid computing platforms. Current authorization systems on these remote systems have largely based decisions solely on the identity of t...
Sang-Min Park, Glenn S. Wasson, Marty Humphrey
VLDB
1993
ACM
73views Database» more  VLDB 1993»
13 years 8 months ago
A Model of Methods Access Authorization in Object-oriented Databases
Object-oriented databases are a recent and important development and many studies of them have been performed. These consider aspects such as data modeling, query languages, perfo...
Nurit Gal-Oz, Ehud Gudes, Eduardo B. Fernán...
ICDCS
1993
IEEE
13 years 8 months ago
Proxy-Based Authorization and Accounting for Distributed Systems
Despite recent widespread interest in the secure authentication of principals across computer networks there has been considerably less discussion of distributed mechanisms to sup...
B. Clifford Neuman