Sciweavers

807 search results - page 40 / 162
» Term Rewriting for Access Control
Sort
View
CCS
2010
ACM
14 years 9 months ago
SecTag: a multi-policy supported secure web tag framework
Traditional web application development often encounters tight coupling problem between access control logic and business logic. It is hard to configure and modify access control ...
Ruixuan Li, Meng Dong, Bin Liu, Jianfeng Lu, Xiaop...
ICDCSW
2003
IEEE
15 years 7 months ago
Using Service Brokers for Accessing Backend Servers for Web Applications
— Current Web servers use various API sets to access backend services. This model does not support service differentiation, overload control, caching of contents generated by bac...
Huamin Chen, Prasant Mohapatra
DBSEC
2000
112views Database» more  DBSEC 2000»
15 years 3 months ago
Coordinating Policy for Federated Applications
Abstract At the start of its present term of office in 1997 the UK government published a planning document promising ubiquitous access to Electronic Health Records (EHRs) held wit...
Ken Moody
WOWMOM
2006
ACM
149views Multimedia» more  WOWMOM 2006»
15 years 8 months ago
On-Demand Reliable Medium Access in Sensor Networks
A wireless sensor network typically consists of a dense deployment of sensor nodes to achieve higher resolution and better network coverage. A dense network also increases the fau...
Ratnabali Biswas, Vivek Jain, Chittabrata Ghosh, D...
ITICSE
2005
ACM
15 years 7 months ago
Providing students universal access to a centralized, graphical computing environment
We investigate the use of a thin-client based configuration in providing students with universal access to a centralized, graphical computing environment. The primary goal is to ...
Michael H. Goldwasser, David Letscher