Sciweavers

164 search results - page 4 / 33
» On the Incoherencies in Web Browser Access Control Policies
Sort
View
ENTCS
2006
140views more  ENTCS 2006»
14 years 9 months ago
A Web Service Architecture for Enforcing Access Control Policies
Web services represent a challenge and an opportunity for organizations wishing to expose product and services offerings through the Internet. The Web service technology provides ...
Claudio Agostino Ardagna, Ernesto Damiani, Sabrina...
63
Voted
WWW
2007
ACM
15 years 10 months ago
Subspace: secure cross-domain communication for web mashups
Combining data and code from third-party sources has enabled a new wave of web mashups that add creativity and functionality to web applications. However, browsers are poorly desi...
Collin Jackson, Helen J. Wang
IADIS
2004
14 years 11 months ago
Web server authorisation with the policyupdater access control system
The PolicyUpdater1 system is a generic access control system that provides policy evaluations and dynamic policy updates. These functions are achieved by the use of a logic-based ...
Vino Fernando Crescini, Yan Zhang, Weiyuan Wang
SIS
2008
14 years 11 months ago
Network Access Control Interoperation using Semantic Web Techniques
Network Access Control requirements are typically implemented in practice as a series of heterogeneous security-mechanism-centric policies that span system services and application...
William M. Fitzgerald, Simon N. Foley, Mích...
DBSEC
2007
121views Database» more  DBSEC 2007»
14 years 11 months ago
XACML Policies for Exclusive Resource Usage
The extensible access control markup language (XACML) is the standard access control policy specification language of the World Wide Web. XACML does not provide exclusive accesse...
Vijayant Dhankhar, Saket Kaushik, Duminda Wijeseke...