Sciweavers

1010 search results - page 115 / 202
» An Access Control Framework for Pervasive Computing Environm...
Sort
View
SACMAT
2009
ACM
15 years 6 months ago
An algebra for fine-grained integration of XACML policies
Collaborative and distributed applications, such as dynamic coalitions and virtualized grid computing, often require integrating access control policies of collaborating parties. ...
Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, ...
SACMAT
2009
ACM
15 years 6 months ago
Supporting RBAC with XACML+OWL
XACML does not natively support RBAC and even the specialized XACML profiles are not able to support many relevant constraints such as static and dynamic separation of duty. Exte...
Rodolfo Ferrini, Elisa Bertino
SBP
2012
Springer
13 years 7 months ago
Creating Interaction Environments: Defining a Two-Sided Market Model of the Development and Dominance of Platforms
Interactions between individuals, both economic and social, are increasingly mediated by technological systems. Such platforms facilitate interactions by controlling and regularizi...
Walter E. Beyeler, Andjelka Kelic, Patrick D. Finl...
BPM
2005
Springer
118views Business» more  BPM 2005»
15 years 5 months ago
Applying Enterprise Models to Design Cooperative Scientific Environments
Scientific experiments are supported by activities that create, use, communicate and distribute information whose organizational dynamics is similar to processes performed by distr...
Andrea Bosin, Nicoletta Dessì, Maria Grazia...
CCS
2010
ACM
15 years 2 days ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...