Sciweavers

617 search results - page 7 / 124
» Research Challenges for the Security of Control Systems
Sort
View
ESORICS
2008
Springer
15 years 1 months ago
On the Security of Delegation in Access Control Systems
Delegation is a mechanism that allows a user A to act on another user B's behalf by making B's access rights available to A. It is well recognized as an important mechani...
Qihua Wang, Ninghui Li, Hong Chen
BPM
2009
Springer
143views Business» more  BPM 2009»
15 years 6 months ago
Integrating Users in Object-Aware Process Management Systems: Issues and Challenges
Despite the increasing maturity of contemporary Workflow Management Systems (WfMS), there still exist numerous process-aware application systems with more or less hard-coded proce...
Vera Künzle, Manfred Reichert
ENTCS
2006
140views more  ENTCS 2006»
14 years 11 months ago
A Web Service Architecture for Enforcing Access Control Policies
Web services represent a challenge and an opportunity for organizations wishing to expose product and services offerings through the Internet. The Web service technology provides ...
Claudio Agostino Ardagna, Ernesto Damiani, Sabrina...
NSPW
2006
ACM
15 years 5 months ago
Inconsistency in deception for defense
The use of deception is one of many defensive techniques being explored today. In the past, defenders of systems have used deception haphazardly, but now researchers are developin...
Vicentiu Neagoe, Matt Bishop
COMPSAC
2009
IEEE
15 years 6 months ago
A Contextual Guidance Approach to Software Security
With the ongoing trend towards the globalization of software systems and their development, components in these systems might not only work together, but may end up evolving indep...
Philipp Schügerl, David Walsh, Juergen Rillin...