Sciweavers

878 search results - page 125 / 176
» A Compiler-Based Approach to Data Security
Sort
View
SDMW
2004
Springer
15 years 3 months ago
A Flexible Framework for Architecting XML Access Control Enforcement Mechanisms
Abstract. Due to the growing interest in XML security, various access control schemes have been proposed recently. However, little effort has been put forth to facilitate a unifor...
Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu
AGENTS
2000
Springer
15 years 2 months ago
Capability-based agent matchmaking
In an agent-based system, where different agents form dynamic associations for the purposes of collaborative processing, agents must be able to locate other agents that can provi...
Anthony R. Cassandra, Damith Chandrasekara, Marian...
OOPSLA
2000
Springer
15 years 1 months ago
Application isolation in the JavaTM Virtual Machine
To date, systems offering multitasking for the JavaTM programming language either use one process or one class loader for each application. Both approaches are unsatisfactory. Usi...
Grzegorz Czajkowski
DIM
2009
ACM
15 years 4 months ago
Mnikr: reputation construction through human trading of distributed social identities
Reputation forms an important part of how we come to trust people in face-to-face interactions, and thus situations involving trust online have come to realize that reputation is ...
Brendan Francis O'Connor, John Linwood Griffin
ACSAC
2008
IEEE
15 years 4 months ago
Please Permit Me: Stateless Delegated Authorization in Mashups
Mashups have emerged as a Web 2.0 phenomenon, connecting disjoint applications together to provide unified services. However, scalable access control for mashups is difficult. T...
Ragib Hasan, Marianne Winslett, Richard M. Conlan,...