Sciweavers

374 search results - page 31 / 75
» Managing Delegation in Access Control Models
Sort
View
IFIP
2004
Springer
15 years 3 months ago
A Formal Approach to Specify and Deploy a Network Security Policy
Current firewall configuration languages have no well founded semantics. Each firewall implements its own algorithm that parses specific proprietary languages. The main conseq...
Frédéric Cuppens, Nora Cuppens-Boula...
CIMCA
2008
IEEE
14 years 11 months ago
Portlets-Based Portal for an E-learning Grid
This paper describes a portlet-based portal that provides user interfaces for access a Grid-based elearning platform. E-learning platforms that exploit resources and computing pow...
Felicia Ionescu, Cristina Elena Stoica, Mircea Dea...
DBSEC
2009
130views Database» more  DBSEC 2009»
14 years 10 months ago
Implementing Reflective Access Control in SQL
Reflective Database Access Control (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege in an access control ...
Lars E. Olson, Carl A. Gunter, William R. Cook, Ma...
COORDINATION
2000
Springer
15 years 2 months ago
Coordination and Access Control in Open Distributed Agent Systems: The TuCSoN Approach
Coordination and access control are related issues in open distributed agent systems, being both concerned with governing interaction between agents and resources. In particular, w...
Marco Cremonini, Andrea Omicini, Franco Zambonelli
SEC
2004
14 years 11 months ago
Interactive Access Control for Web Services
Business Processes for Web Services (BPEL4WS) are the new paradigms for lightweight enterprise integration. They cross organizational boundaries and are provided by entities that s...
Hristo Koshutanski, Fabio Massacci