Sciweavers

352 search results - page 43 / 71
» Context-sensitive Access Control Model and Implementation
Sort
View
IEEEARES
2007
IEEE
15 years 6 months ago
Formalising Dynamic Trust Negotiations in Decentralised Collaborative e-Health Systems
Access control in decentralised collaborative systems present huge challenges especially where many autonomous entities including organisations, humans, software agents from diff...
Oluwafemi Ajayi, Richard O. Sinnott, Anthony Stell
SP
1998
IEEE
106views Security Privacy» more  SP 1998»
15 years 4 months ago
Understanding Java Stack Inspection
Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
Dan S. Wallach, Edward W. Felten
JCS
2008
69views more  JCS 2008»
14 years 11 months ago
Non-delegatable authorities in capability systems
We present a novel technique, known as the non-delegatable authority (NDA), for distributing authority to unconfined subjects in capability systems that prevents them from sharing...
Toby C. Murray, Duncan A. Grove
ICDE
2007
IEEE
149views Database» more  ICDE 2007»
15 years 3 months ago
Private Relationships in Social Networks
Current social networks implement very simple protection mechanisms, according to which a user can state whether his/her personal data, relationships, and resources should be eith...
Barbara Carminati, Elena Ferrari, Andrea Perego
RSP
1999
IEEE
125views Control Systems» more  RSP 1999»
15 years 4 months ago
Extended Synchronous Dataflow for Efficient DSP System Prototyping
Though synchronous dataflow (SDF) graph has been a successful input specification language for digital signal processing (DSP) applications, lack of support for global states makes...
Chanik Park, JaeWoong Chung, Soonhoi Ha