Sciweavers

1073 search results - page 160 / 215
» Secure context-sensitive authorization
Sort
View
CCGRID
2005
IEEE
15 years 8 months ago
Experiences in teaching grid computing to advanced level students
The development of teaching materials for future software engineers is critical to the long term success of the Grid. At present however there is considerable turmoil in the Grid ...
Richard O. Sinnott, A. J. Stell, J. P. Watt
CSFW
2005
IEEE
15 years 8 months ago
Analysis of Typed Analyses of Authentication Protocols
This paper contrasts two existing type-based techniques for the analysis of authentication protocols. The former, proposed by Gordon and Jeffrey, uses dependent types for nonces a...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei
SP
2005
IEEE
104views Security Privacy» more  SP 2005»
15 years 8 months ago
On Safety in Discretionary Access Control
An apparently prevailing myth is that safety is undecidable in Discretionary Access Control (DAC); therefore, one needs to invent new DAC schemes in which safety analysis is decid...
Ninghui Li, Mahesh V. Tripunitara
SC
2005
ACM
15 years 8 months ago
Identity Boxing: A New Technique for Consistent Global Identity
Today, users of the grid may easily authenticate themselves to computing resources around the world using a public key security infrastructure. However, users are forced to employ...
Douglas Thain
ATAL
2005
Springer
15 years 8 months ago
Access control with safe role assignment for mobile agents
Mobile agent systems provide new perspectives for distributed e-commerce applications. Sea-of-Data (SoD) applications are those that need to process huge quantities of distributed...
Guillermo Navarro, Joan Borrell, Jose A. Ortega-Ru...