Sciweavers

705 search results - page 79 / 141
» Security Policy Coordination for Heterogeneous Information S...
Sort
View
EDBT
2008
ACM
147views Database» more  EDBT 2008»
15 years 10 months ago
iDataGuard: middleware providing a secure network drive interface to untrusted internet data storage
In this demonstration, we present the design and features of iDataGuard. iDataGuard is an interoperable security middleware that allows users to outsource their file systems to he...
Ravi Chandra Jammalamadaka, Roberto Gamboni, Shara...
ENTCS
2006
90views more  ENTCS 2006»
14 years 9 months ago
A Framework for Engineering Interactions in Java-based Component Systems
This paper describes a Java-based framework for the development of componentbased software systems supporting the specification of the logic of component interactions as a first-c...
Antonio Natali, Enrico Oliva, Alessandro Ricci, Mi...
PROLAMAT
1998
14 years 11 months ago
Cooperative Information Management for Distributed Production Nodes
Advanced manufacturing environments nowadays involve a number of cooperating heterogeneous nodes, where each node supports a distinct activity, and their joint efforts and informa...
Hamideh Afsarmanesh, Ammar Benabdelkader, Louis O....
IEEEARES
2007
IEEE
15 years 4 months ago
Formalising Dynamic Trust Negotiations in Decentralised Collaborative e-Health Systems
Access control in decentralised collaborative systems present huge challenges especially where many autonomous entities including organisations, humans, software agents from diff...
Oluwafemi Ajayi, Richard O. Sinnott, Anthony Stell
SACMAT
2009
ACM
15 years 4 months ago
Towards formal security analysis of GTRBAC using timed automata
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri