Sciweavers

837 search results - page 59 / 168
» Rewriting-Based Access Control Policies
Sort
View
83
Voted
POLICY
2009
Springer
15 years 7 months ago
In Vivo Evolution of Policies that Govern a Distributed System
This paper addresses an important open problem confronting any decentralized and stateful access control (AC) mechanism for networked systems, particularly when the system at hand...
Constantin Serban, Naftaly H. Minsky
106
Voted
WETICE
1996
IEEE
15 years 4 months ago
Role-based security for distributed object systems
This paper describes a security architecture designed to support role-based access control for distributed object systems in a large-scale, multi-organisational enterprise in whic...
Nicholas Yialelis, Emil Lupu, Morris Sloman
159
Voted
ESORICS
2011
Springer
14 years 10 days ago
Protecting Private Web Content from Embedded Scripts
Many web pages display personal information provided by users. The goal of this work is to protect that content from untrusted scripts that are embedded in host pages. We present a...
Yuchen Zhou, David Evans
105
Voted
ACSAC
2000
IEEE
15 years 5 months ago
Implementing Security Policies using the Safe Areas of Computation Approach
The World Wide Web is playing a major role in reducing business costs and in providing convenience to users. Digital Libraries capitalize on this technology to distribute document...
André L. M. dos Santos, Richard A. Kemmerer
93
Voted
SIGMETRICS
2008
ACM
179views Hardware» more  SIGMETRICS 2008»
15 years 15 days ago
Xengine: a fast and scalable XACML policy evaluation engine
XACML has become the de facto standard for specifying access control policies for various applications, especially web services. With the explosive growth of web applications depl...
Alex X. Liu, Fei Chen, JeeHyun Hwang, Tao Xie