Sciweavers

3899 search results - page 55 / 780
» Argumentation for Access Control
Sort
View
ENTCS
2007
128views more  ENTCS 2007»
15 years 5 months ago
Rewriting-Based Access Control Policies
In this paper we propose a formalization of access control policies based on term rewriting. The state of the system to which policies are enforced is represented as an algebraic ...
Anderson Santana de Oliveira
ICWS
2004
IEEE
15 years 6 months ago
Access Control for Semantic Web Services
In this paper we make a contribution to the proof and trust layer of the Semantic Web layer cake by integrating two well founded techniques, namely DAML-S (for describing Web serv...
Sudhir Agarwal, Barbara Sprick
CIKM
2005
Springer
15 years 10 months ago
A function-based access control model for XML databases
XML documents are frequently used in applications such as business transactions and medical records involving sensitive information. Typically, parts of documents should be visibl...
Naizhen Qi, Michiharu Kudo, Jussi Myllymaki, Hamid...
WWW
2006
ACM
16 years 5 months ago
Access control enforcement for conversation-based web services
Massimo Mecella, Mourad Ouzzani, Federica Paci, El...
PERCOM
2007
ACM
16 years 4 months ago
Distributed, Uncertainty-Aware Access Control for Pervasive Computing
Access control to sensitive resources in pervasive computing needs to take uncertainty into account. Previous research has developed uncertainty-aware access-control models for en...
Urs Hengartner, Ge Zhong