Sciweavers

376 search results - page 64 / 76
» Integrity constraints in trust management
Sort
View
64
Voted
EGC
2005
Springer
15 years 5 months ago
Telemedical Applications and Grid Technology
In recent years different institutions have launched several telemedicine projects which aimed to encourage the Euro-Mediterranean cooperation. The creation of a Virtual Euro-Medit...
Georgi Graschew, Theo A. Roelofs, Stefan Rakowsky,...
WEBI
2001
Springer
15 years 4 months ago
A Data Model for XML Databases
In the proposed data model for XML databases, an XML element is directly represented as a ground (variable-free) XML expression—a generalization of an XML element by incorporatio...
Vilas Wuwongse, Kiyoshi Akama, Chutiporn Anutariya...
SACMAT
2009
ACM
15 years 6 months ago
Working set-based access control for network file systems
Securing access to files is an important and growing concern in corporate environments. Employees are increasingly accessing files from untrusted devices, including personal hom...
Stephen Smaldone, Vinod Ganapathy, Liviu Iftode
VIZSEC
2007
Springer
15 years 5 months ago
An Interactive Attack Graph Cascade and Reachability Display
Abstract Attack graphs for large enterprise networks improve security by revealing critical paths used by adversaries to capture network assets. Even with simplification, current a...
Leevar Williams, Richard Lippmann, Kyle Ingols
GCC
2003
Springer
15 years 5 months ago
Constructing Secure Web Service Based on XML
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Shaomin Zhang, Baoyi Wang, Lihua Zhou