Sciweavers

1462 search results - page 57 / 293
» Conditional Access in Mobile Systems: Securing the Applicati...
Sort
View
DEXA
2003
Springer
134views Database» more  DEXA 2003»
15 years 7 months ago
Concurrent and Real-Time Update of Access Control Policies
Abstract. Access control policies are security policies that govern access to resources. Real-time update of access control policies, that is, updating policies while they are in e...
Indrakshi Ray, Tai Xin
IJCIS
1998
107views more  IJCIS 1998»
15 years 1 months ago
Supporting Electronic Commerce Transactions with Contracting Services
Abstracting from basic communication mechanisms such as transactionally secure remote procedure calls and remote database access mechanisms, this includes service trading and bro...
Michael Merz, Frank Griffel, M. Tuan Tu, Stefan M&...
PODS
2005
ACM
119views Database» more  PODS 2005»
16 years 2 months ago
Security analysis of cryptographically controlled access to XML documents
Some promising recent schemes for XML access control employ encryption for implementing security policies on published data, avoiding data duplication. In this paper we study one ...
Bogdan Warinschi, Martín Abadi
SACMAT
2009
ACM
15 years 8 months ago
A semantic web based framework for social network access control
The existence of on-line social networks that include person specific information creates interesting opportunities for various applications ranging from marketing to community o...
Barbara Carminati, Elena Ferrari, Raymond Heatherl...
TES
2001
Springer
15 years 6 months ago
Security for Distributed E-Service Composition
Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
Stefan Seltzsam, Stephan Börzsönyi, Alfo...