Sciweavers

5273 search results - page 189 / 1055
» Secured Web Access
Sort
View
ESORICS
2003
Springer
15 years 9 months ago
Hardware Encapsulation of Security Services
Hardware security modules can be used to encapsulate simple security services that bind security functions such as decryption with authorisation and authentication. Such hardware ...
Adrian Baldwin, Simon Shiu
CORR
2006
Springer
93views Education» more  CORR 2006»
15 years 4 months ago
Constructing experimental indicators for Open Access documents
The ongoing paradigm change in the scholarly publication system (`science is turning to e-science') makes it necessary to construct alternative evaluation criteria/metrics wh...
Philipp Mayr
TRUSTBUS
2004
Springer
15 years 10 months ago
Dynamically Changing Trust Structure in Capability Based Access Control Systems
The functioning of modern IT-systems with autonomously acting components requires an elaborate access control system in which each participant can maintain her own trust structure....
Sandra Wortmann, Barbara Sprick, Christoph Kobusch
CCS
2007
ACM
15 years 8 months ago
Efficient techniques for realizing geo-spatial access control
The problem of key management for access control systems has been well-studied, and the literature contains several schemes for hierarchy-based and temporal-based access control. ...
Mikhail J. Atallah, Marina Blanton, Keith B. Frikk...
DLOG
2011
14 years 8 months ago
Correcting Access Restrictions to a Consequence More Flexibly
Recent research has shown that labeling ontologies can be useful for restricting the access to some of the axioms and their implicit consequences. However, the labeling of the axio...
Eldora, Martin Knechtel, Rafael Peñaloza