Sciweavers

1073 search results - page 164 / 215
» Secure context-sensitive authorization
Sort
View
ESORICS
1994
Springer
15 years 7 months ago
On the Expressive Power of the Unary Transformation Model
The Transformation Model TRM was recently introduced 10 in the literature by Sandhu and Ganta. TRM is based on the concept of transformation of rights. The propagation of access ri...
Ravi S. Sandhu, Srinivas Ganta
CHI
2007
ACM
15 years 7 months ago
Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection
Intrusion detection (ID) is one of network security engineers' most important tasks. Textual (command-line) and visual interfaces are two common modalities used to support en...
Ramona Su Thompson, Esa M. Rantanen, William Yurci...
FTDCS
2004
IEEE
15 years 6 months ago
Towards Supporting Fine-Grained Access Control for Grid Resources
The heterogeneous nature and independent administration of geographically dispersed resources in Grid, demand the need for access control using fine-grained policies. In this pape...
Elisa Bertino, Pietro Mazzoleni, Bruno Crispo, Swa...
EUPROJECTS
2006
Springer
15 years 6 months ago
Applying the MVC Pattern to Generated User Interfaces with a Focus on Audio
The mobile user can interact with devices in the environment using either the devices themselves or a device she carries with her. This requires an adaption of the user interface t...
Dirk Schnelle, Tobias Klug
EUROPKI
2006
Springer
15 years 6 months ago
On the Resilience of Key Agreement Protocols to Key Compromise Impersonation
Abstract. Key agreement protocols are a fundamental building block for ensuring authenticated and private communications between two parties over an insecure network. This paper fo...
Maurizio Adriano Strangio