Sciweavers

926 search results - page 52 / 186
» Policy framings for access control
Sort
View
65
Voted
CSSE
2004
IEEE
14 years 10 months ago
A comparison of modeling strategies in defining XML-based access control languages
One of the most important features of XML-based Web services is that they can be easily accessed over the Internet, but this makes them vulnerable to a series of security threats....
Claudio Agostino Ardagna, Sabrina De Capitani di V...
111
Voted
AIIA
2005
Springer
15 years 5 days ago
Argumentation for Access Control
In this paper we are interested in argument based reasoning for access control, for example in the context of agents negotiating access to resources or web services in virtual orga...
Guido Boella, Joris Hulstijn, Leendert W. N. van d...
87
Voted
DBSEC
2010
162views Database» more  DBSEC 2010»
14 years 11 months ago
Distributed and Secure Access Control in P2P Databases
The intent of peer data management systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to...
Angela Bonifati, Ruilin Liu, Hui (Wendy) Wang
88
Voted
CLOUDCOM
2010
Springer
14 years 8 months ago
A Token-Based Access Control System for RDF Data in the Clouds
The Semantic Web is gaining immense popularity-and with it, the Resource Description Framework (RDF) broadly used to model Semantic Web content. However, access control on RDF sto...
Arindam Khaled, Mohammad Farhan Husain, Latifur Kh...
82
Voted
XMLSEC
2003
ACM
15 years 3 months ago
First experiences using XACML for access control in distributed systems
Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as com...
Markus Lorch, Seth Proctor, Rebekah Lepro, Dennis ...