Sciweavers

445 search results - page 11 / 89
» Authorization and Access Control in IRO-DB
Sort
View
IEEECIT
2005
IEEE
15 years 3 months ago
Context-sensitive Access Control Model and Implementation
Context is a key factor in making make access control decision in modern information system. But a formal context model is needed to guide research of implementation of Context-se...
Weili Han, Junjing Zhang, Xiaobo Yao
ICALT
2009
IEEE
15 years 4 months ago
Mediating Distribution Models and Access Control for the Exchange of Learning Objects
This paper presents a learning object broker that aims to mediate and control accesses to learning objects offered by the “Learning Resource Exchange”. This broker provides a u...
Jean-Noel Colin, Tien-Dung Le, David Massart
ESORICS
2009
Springer
15 years 10 months ago
PCAL: Language Support for Proof-Carrying Authorization Systems
By shifting the burden of proofs to the user, a proof-carrying authorization (PCA) system can automatically enforce complex access control policies. Unfortunately, managing those p...
Avik Chaudhuri, Deepak Garg
CIKM
2005
Springer
15 years 3 months ago
The case for access control on XML relationships
With the emergence of XML as the de facto standard to exchange and disseminate information, the problem of regulating access to XML documents has attracted a considerable attentio...
Béatrice Finance, Saïda Medjdoub, Phil...
ICDCIT
2004
Springer
15 years 3 months ago
Using Schemas to Simplify Access Control for XML Documents
Abstract. Organizations are increasingly using the the eXtensible Markup Language (XML) for document representation and exchange on the Web. To protect an XML document from unautho...
Indrakshi Ray, Marianna Muller