Sciweavers

5273 search results - page 117 / 1055
» Secured Web Access
Sort
View
ASSETS
2004
ACM
15 years 7 months ago
A web accessibility service: update and findings
We report here on our progress on a project first described at the ASSETS 2002 conference. At that time, we had developed a prototype system in which a proxy server intermediary w...
Vicki L. Hanson, John T. Richards
CIKM
2004
Springer
15 years 7 months ago
QFilter: fine-grained run-time XML access control via NFA-based query rewriting
At present, most of the state-of-the-art solutions for XML access controls are either (1) document-level access control techniques that are too limited to support fine-grained sec...
Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu
CCS
2007
ACM
15 years 7 months ago
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
CCS
2008
ACM
15 years 3 months ago
On spatio-temporal constraints and inheritance in role-based access control
Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based acces...
Liang Chen, Jason Crampton
CONCURRENCY
2008
105views more  CONCURRENCY 2008»
15 years 1 months ago
Coordinating access control in grid services
We describe how to control the cumulative use of distributed grid resources by using coordination aware policy decision points (coordinated PDPs) and an SQL database to hold "...
David W. Chadwick, Linying Su, Romain Laborde