Sciweavers

2979 search results - page 357 / 596
» Modelling secure multiagent systems
Sort
View
IMSA
2001
121views Multimedia» more  IMSA 2001»
15 years 5 months ago
Technology Integrated Learning Environment - A Web-based Distance Learning System
This paper analyses the requirements of a third-generation technology integrated learning environment. The architecture proposed is analysed in terms of the generic constraints of...
Regina Gehne, Chris R. Jesshope, Zhenzi Zhang
CCS
2008
ACM
15 years 6 months ago
Flexible and secure enterprise rights management based on trusted virtual domains
The requirements for secure document workflows in enterprises become increasingly sophisticated, with employees performing different tasks under different roles using the same pro...
Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, ...
CCS
2008
ACM
15 years 6 months ago
A security architecture for transient trust
In extraordinary situations, certain individuals may require access to information for which they are not normally authorized. For example, to facilitate rescue of people trapped ...
Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark...
WETICE
2003
IEEE
15 years 9 months ago
Policy Storage for Role-Based Access Control Systems
Role-based access control has been a focal area for many security researchers over the last decade. There have been a large number of models, and many rich specification language...
András Belokosztolszki, David M. Eyers, Wei...
FMCO
2003
Springer
121views Formal Methods» more  FMCO 2003»
15 years 9 months ago
TulaFale: A Security Tool for Web Services
Web services security specifications are typically expressed as a mixture of XML schemas, example messages, and narrative explanations. We propose a new specification language fo...
Karthikeyan Bhargavan, Cédric Fournet, Andr...