Sciweavers

1134 search results - page 54 / 227
» Distributed Proving in Access-Control Systems
Sort
View
SP
2009
IEEE
155views Security Privacy» more  SP 2009»
15 years 10 months ago
A Logic of Secure Systems and its Application to Trusted Computing
We present a logic for reasoning about properties of secure systems. The logic is built around a concurrent programming language with constructs for modeling machines with shared ...
Anupam Datta, Jason Franklin, Deepak Garg, Dilsun ...
VLDB
2006
ACM
172views Database» more  VLDB 2006»
16 years 3 months ago
Hierarchical hippocratic databases with minimal disclosure for virtual organizations
Abstract The protection of customer privacy is a fundamental issue in today's corporate marketing strategies. Not surprisingly, many research efforts have proposed new privacy...
Fabio Massacci, John Mylopoulos, Nicola Zannone
HT
1996
ACM
15 years 7 months ago
The HyperDisco Approach to Open Hypermedia Systems
Computing support forlargeengineeringenterprisesprovides an example of the need for hypermedia-based collaborative computing systems composed of a large number of distributed hete...
Uffe Kock Wiil, John J. Leggett
MADNES
2005
Springer
15 years 8 months ago
An XML Standards Based Authorization Framework for Mobile Agents
An outstanding security problem in mobile agent systems is resource access control, or authorization in its broader sense. In this paper we present an authorization framework for m...
Guillermo Navarro, Joan Borrell
ICPADS
2008
IEEE
15 years 9 months ago
An Efficient Policy System for Body Sensor Networks
Body sensor networks (BSNs) have become a promising technology for healthcare, in which biosensors continuously monitor physiological parameters of a user. Distinct from conventio...
Yanmin Zhu, Sye Loong Keoh, Morris Sloman, Emil Lu...