Sciweavers

5273 search results - page 167 / 1055
» Secured Web Access
Sort
View
IADIS
2004
15 years 5 months ago
Using the concept of user policies for improving HTML documents accessibility
In this paper, we introduce the concept of "user policies" and its applications to the browsing of HTML documents. The objective of policies is to specify user preferenc...
Benoît Encelle, Nadine Baptiste-Jessel
ISW
1997
Springer
15 years 8 months ago
A Framework for the Management of Information Security
Information security is based on access control models and cryptographic techniques. These are well established areas of research in computer security, but are not capable of supp...
Jussipekka Leiwo, Yuliang Zheng
SERVICES
2008
71views more  SERVICES 2008»
15 years 5 months ago
Identifying Opportunities for Web Services Security Performance Optimizations
WS-Security is an essential component of the Web services protocol stack. WS-Security provides end-to-end security properties, thereby assuring the participation of nonsecure tran...
Robert A. van Engelen, Wei Zhang
CCS
2006
ACM
15 years 8 months ago
On the modeling and analysis of obligations
Traditional security policies largely focus on access control requirements, which specify who can access what under what circumstances. Besides access control requirements, the av...
Keith Irwin, Ting Yu, William H. Winsborough
WORDS
2005
IEEE
15 years 10 months ago
An RBAC Framework for Time Constrained Secure Interoperation in Multi-domain Environments
In emerging e-commerce applications, time constrained information sharing between different systems is becoming a common phenomenon. A flexible and efficient mechanism is needed t...
Smithi Piromruen, James B. D. Joshi