Sciweavers

177 search results - page 22 / 36
» From Business Process Choreography to Authorization Policies
Sort
View
114
Voted
ICAC
2005
IEEE
15 years 7 months ago
Distributed Stream Management using Utility-Driven Self-Adaptive Middleware
We consider pervasive computing applications that process and aggregate data-streams emanating from highly distributed data sources to produce a stream of updates that have an imp...
Vibhore Kumar, Brian F. Cooper, Karsten Schwan
121
Voted
RBAC
1997
234views more  RBAC 1997»
15 years 3 months ago
Comparing simple role based access control models and access control lists
The RBAC metaphor is powerful in its ability to express access control policy in terms of the way in which administrators view organizations. The functionality of simple Role Base...
John F. Barkley
SACMAT
2009
ACM
15 years 8 months ago
Dynamic mandatory access control for multiple stakeholders
In this paper, we present a mandatory access control system that uses input from multiple stakeholders to compose policies based on runtime information. In the emerging ubiquitous...
Vikhyath Rao, Trent Jaeger
133
Voted
PKC
1998
Springer
126views Cryptology» more  PKC 1998»
15 years 6 months ago
Certifying Trust
A basic function of all signatures, digital or not, is to express trust and authority, explicit or implied. This is especially the case with digital signatures used in certificates...
Ilari Lehti, Pekka Nikander
DATASCIENCE
2006
105views more  DATASCIENCE 2006»
15 years 1 months ago
Data publication in the open access initiative
The `Berlin Declaration' was published in 2003 as a guideline to policy makers to promote the Internet as a functional instrument for a global scientific knowledge base. Beca...
Jens Klump, Roland Bertelmann, Jan Brase, Michael ...