Sciweavers

1363 search results - page 28 / 273
» Distributed Authorization with Distributed Grammars
Sort
View
PERCOM
2005
ACM
15 years 10 months ago
Secure context-sensitive authorization
There is a recent trend toward rule-based authorization systems to achieve flexible security policies. Also, new sensing technologies in pervasive computing make it possible to de...
Kazuhiro Minami, David Kotz
COLCOM
2007
IEEE
15 years 5 months ago
Unraveling decentralized authorization for multi-domain collaborations
Abstract—Current authorization solutions take highly case-bycase approaches. First of all, the solutions address particular types of multi-domain collaborations such as Virtual O...
Hannah K. Lee
68
Voted
COLCOM
2008
IEEE
15 years 5 months ago
Supporting Agile Development of Authorization Rules for SME Applications
Custom SME applications for collaboration and workflow have become affordable when implemented as Web applications employing Agile methodologies. Security engineering is still di...
Steffen Bartsch, Karsten Sohr, Carsten Bormann
90
Voted
ECIR
2010
Springer
15 years 10 days ago
Mining Neighbors' Topicality to Better Control Authority Flow
Web pages are often recognized by others through contexts. These contexts determine how linked pages influence and interact with each other. When differentiating such interactions,...
Na Dai, Brian D. Davison, Yaoshuang Wang
77
Voted
SP
1999
IEEE
145views Security Privacy» more  SP 1999»
15 years 3 months ago
A User-Centered, Modular Authorization Service Built on an RBAC Foundation
Psychological acceptability has been mentioned as a requirement for secure systems for as long as least privilege and fail safe defaults, but until now has been all but ignored in...
Mary Ellen Zurko, Richard Simon, Tom Sanfilippo