Sciweavers

837 search results - page 65 / 168
» Rewriting-Based Access Control Policies
Sort
View
ACSAC
2000
IEEE
15 years 5 months ago
Extending Java for Package based Access Control
This paper describes an extension of the Java language that provides “programmable security.” The approach augments the Java syntax with constructs for specifying various acce...
John Hale, Mauricio Papa, Oliver Bremer, Rodrigo C...
SEMWEB
2007
Springer
15 years 6 months ago
Enabling Advanced and Context-Dependent Access Control in RDF Stores
Semantic Web databases allow efficient storage and access to RDF statements. Applications are able to use expressive query languages in order to retrieve relevant metadata to perfo...
Fabian Abel, Juri Luca De Coi, Nicola Henze, Arne ...
101
Voted
IFIP
2009
Springer
14 years 10 months ago
Model Checking of Security-Sensitive Business Processes
Security-sensitive business processes are business processes that must comply with security requirements (e.g. authorization constraints). In previous works it has been shown that ...
Alessandro Armando, Serena Elisa Ponta
ISI
2006
Springer
15 years 17 days ago
Synergy: A Policy-Driven, Trust-Aware Information Dissemination Framework
Information dissemination is of vital importance in today's information-centric world. However, controlling the flow of information across multiple security domains is a probl...
Ragib Hasan, Marianne Winslett
112
Voted
TLT
2008
149views more  TLT 2008»
15 years 15 days ago
Control Your eLearning Environment: Exploiting Policies in an Open Infrastructure for Lifelong Learning
Abstract-- Nowadays, people are in need for continuous learning in order to keep up to date or to be upgraded in their job. An infrastructure for life-long learning requires contin...
Juri Luca De Coi, Philipp Kärger, Arne Wolf K...