Sciweavers

445 search results - page 18 / 89
» Authorization and Access Control in IRO-DB
Sort
View
65
Voted
DEON
2008
Springer
14 years 11 months ago
Variations in Access Control Logic
Abstract. In this paper we investigate the design space of access control logics. Specifically, we consider several possible axioms for the common operator says. Some of the axioms...
Martín Abadi
IJNSEC
2011
89views more  IJNSEC 2011»
14 years 4 months ago
A Novel Key Management Scheme for Dynamic Access Control in a Hierarchy
Shen and Chen proposed a novel key management scheme for dynamic access control in a hierarchy. In this article, the authors shall present an improved version of Shen and Chen’s...
Shiang-Feng Tzeng, Cheng-Chi Lee, Tzu-Chun Lin
SACMAT
2009
ACM
15 years 4 months ago
xDomain: cross-border proofs of access
A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy — a...
Lujo Bauer, Limin Jia, Michael K. Reiter, David Sw...
ACSAC
2001
IEEE
15 years 1 months ago
A Component-Based Architecture for Secure Data Publication
We present an approach for controlling access to data publishers in the framework of Web-based information services. The paper presents a model for enforcing access control regula...
Piero A. Bonatti, Ernesto Damiani, Sabrina De Capi...
70
Voted
IPPS
2009
IEEE
15 years 4 months ago
Performance prediction for running workflows under role-based authorization mechanisms
When investigating the performance of running scientific/ commercial workflows in parallel and distributed systems, we often take into account only the resources allocated to the ...
Ligang He, Mark Calleja, Mark Hayes, Stephen A. Ja...