Sciweavers

837 search results - page 48 / 168
» Rewriting-Based Access Control Policies
Sort
View
93
Voted
JHSN
2006
96views more  JHSN 2006»
15 years 15 days ago
Supporting heterogeneous middleware security policies in WebCom
With the growing interest in service-oriented architectures, achieving seamless interoperability between heterogeneous middleware technologies has become increasingly important. W...
Simon N. Foley, Barry P. Mulcahy, Thomas B. Quilli...
SACMAT
2003
ACM
15 years 5 months ago
An access control model for dynamic client-side content
The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resource...
Adam Hess, Kent E. Seamons
111
Voted
SACMAT
2005
ACM
15 years 6 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang
ACSAC
2002
IEEE
15 years 5 months ago
Access Control for Active Spaces
Active Spaces are physical spaces augmented with heterogeneous computing and communication devices along with supporting software infrastructure. This integration facilitates coll...
Geetanjali Sampemane, Prasad Naldurg, Roy H. Campb...
221
Voted
ICDE
2008
IEEE
140views Database» more  ICDE 2008»
16 years 1 months ago
A Security Punctuation Framework for Enforcing Access Control on Streaming Data
The management of privacy and security in the context of data stream management systems (DSMS) remains largely an unaddressed problem to date. Unlike in traditional DBMSs where acc...
Rimma V. Nehme, Elke A. Rundensteiner, Elisa Berti...