Sciweavers

330 search results - page 55 / 66
» A Policy Language for Integrating Heterogeneous Authorizatio...
Sort
View
101
Voted
JNCA
2008
95views more  JNCA 2008»
15 years 1 months ago
Techniques to support Web Service selection and consumption with QoS characteristics
This work proposes a Web Service (WS) discovery model in which the functional and nonfunctional requirements are taken into account during service discovery. The proposed infrastr...
Vassiliki Diamadopoulou, Christos Makris, Yannis P...
SIGMOD
2010
ACM
227views Database» more  SIGMOD 2010»
15 years 6 months ago
SecureBlox: customizable secure distributed data processing
We present SecureBlox, a declarative system that unifies a distributed query processor with a security policy framework. SecureBlox decouples security concerns from system speciļ...
William R. Marczak, Shan Shan Huang, Martin Braven...
89
Voted
CHI
2010
ACM
15 years 8 months ago
Communicating software agreement content using narrative pictograms
This paper presents narrative pictograms, diagrams designed to convey the abstract concepts of a software agreement. Narrative pictograms arose out of a need to increase the chanc...
Matthew Kay, Michael Terry
ACSAC
2007
IEEE
15 years 8 months ago
Quarantining Untrusted Entities: Dynamic Sandboxing Using LEAP
Jails, Sandboxes and other isolation mechanisms limit the damage from untrusted programs by reducing a process’s privileges to the minimum. Sandboxing is designed to thwart such...
Manigandan Radhakrishnan, Jon A. Solworth
ICDE
2007
IEEE
134views Database» more  ICDE 2007»
15 years 8 months ago
Apply Model Checking to Security Analysis in Trust Management
Trust management is a form of access control that uses delegation to achieve scalability beyond a single organization or federation. However, delegation can be difficult to contr...
Mark Reith, Jianwei Niu, William H. Winsborough