Sciweavers

1527 search results - page 46 / 306
» A Survey of Web Security
Sort
View
WETICE
2006
IEEE
15 years 5 months ago
Authorisation Using Attributes from Multiple Authorities
This paper presents the results of a survey of requirements for attribute aggregation in authorisation systems, gathered from an international community of security professionals....
David W. Chadwick
ICOIN
2005
Springer
15 years 4 months ago
Experience with Engineering a Network Forensics System
Network Forensics is an important extension to the model of network security where emphasis is traditionally put on prevention and to a lesser extent on detection. It focuses on th...
Ahmad Almulhem, Issa Traoré
LICS
2003
IEEE
15 years 4 months ago
Logic in Access Control
Access control is central to security in computer systems. Over the years, there have been many efforts to explain and to improve access control, sometimes with logical ideas and ...
Martín Abadi
AGENTS
1998
Springer
15 years 3 months ago
Liability for Autonomous Agent Design
Though exciting scientifically, autonomous agent design can result in legal liability. This paper surveys those legal concerns, focusing on issues arising from the unique qualitie...
Carey Heckman, Jacob O. Wobbrock
OOPSLA
1989
Springer
15 years 2 months ago
PCLOS: A Critical Review
This paper uses the persistent object system PCLOS to survey some problems and bene ts of object persistence. The system is analyzed along several relevant dimensions. PCLOS provi...
Andreas Paepcke