Sciweavers

4445 search results - page 88 / 889
» Reflective Authorization Systems
Sort
View
CSFW
2010
IEEE
15 years 7 months ago
Towards Quantitative Analysis of Proofs of Authorization: Applications, Framework, and Techniques
—Although policy compliance testing is generally treated as a binary decision problem, the evidence gathered during the trust management process can actually be used to examine t...
Adam J. Lee, Ting Yu
JUCS
2008
163views more  JUCS 2008»
15 years 4 months ago
Authoring Social-aware Tasks on Active Spaces
: Social-aware computing is an emerging trend based on ubiquitous computing technologies and collaborative work. A successful design demands a better understanding of group tasks, ...
Roberto F. Arroyo, Miguel Gea, José Luis Ga...
SIN
2010
ACM
15 years 1 months ago
A calculus for the qualitative risk assessment of policy override authorization
Policy override is gaining traction in the research community to improve the efficiency and usability of authorization mechanisms. These mechanisms turn the conventional privilege...
Steffen Bartsch
AOSD
2009
ACM
15 years 10 months ago
Enforcing security for desktop clients using authority aspects
Desktop client applications interact with both local and remote resources. This is both a benefit in terms of the rich features desktop clients can provide, but also a security r...
Brett Cannon, Eric Wohlstadter
EHCI
2004
15 years 5 months ago
Finding Iteration Patterns in Dynamic Web Page Authoring
Most of the current WWW is made up of dynamic pages. The development of dynamic pages is a difficult and costly endeavour, out-of-reach for most users, experts, and content produce...
José A. Macías, Pablo Castells