Sciweavers

2250 search results - page 10 / 450
» Authorizing applications in singularity
Sort
View
COLCOM
2008
IEEE
15 years 4 months ago
Supporting Agile Development of Authorization Rules for SME Applications
Custom SME applications for collaboration and workflow have become affordable when implemented as Web applications employing Agile methodologies. Security engineering is still di...
Steffen Bartsch, Karsten Sohr, Carsten Bormann
HCI
2007
14 years 11 months ago
Integrating Authoring Tools into Model-Driven Development of Interactive Multimedia Applications
Abstract. The Multimedia Modeling Language (MML) is a platformindependent modeling language for model-driven development of interactive multimedia applications. Using models provid...
Andreas Pleuß, Heinrich Hußmann
IEEEARES
2010
IEEE
15 years 1 months ago
Supporting Authorization Policy Modification in Agile Development of Web Applications
Web applications are increasingly developed in Agile development processes. Business-centric Web applications need complex authorization policies to securely implement business pro...
Steffen Bartsch
EGOV
2010
Springer
14 years 10 months ago
Facilitating E-Government Services through SDIs, an Application for Water Abstractions Authorizations
Application for Water Abstractions Authorizations Miguel
Miguel Ángel Latre, Francisco J. Lóp...
SACMAT
2006
ACM
15 years 3 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov