Sciweavers

800 search results - page 78 / 160
» XML access control using static analysis
Sort
View
144
Voted
ESOP
2000
Springer
15 years 7 months ago
Secure Information Flow as Typed Process Behaviour
Abstract. We propose a new type discipline for the -calculus in which secure information flow is guaranteed by static type checking. Secrecy levels are assigned to channels and are...
Kohei Honda, Vasco Thudichum Vasconcelos, Nobuko Y...
ICDE
2007
IEEE
134views Database» more  ICDE 2007»
15 years 9 months ago
Apply Model Checking to Security Analysis in Trust Management
Trust management is a form of access control that uses delegation to achieve scalability beyond a single organization or federation. However, delegation can be difficult to contr...
Mark Reith, Jianwei Niu, William H. Winsborough
124
Voted
MIDDLEWARE
2004
Springer
15 years 8 months ago
Interoperability Among Independently Evolving Web Services
The increasing popularity of XML Web services motivates us to examine if it is feasible to substitute one vendor service for another when using a Web-based application, assuming th...
Shankar Ponnekanti, Armando Fox
111
Voted
ICC
2007
IEEE
147views Communications» more  ICC 2007»
15 years 9 months ago
Performance Analysis of Adaptive Rate Scheduling Scheme for 3G WCDMA Wireless Networks with Multi-Operators
— Sharing of 3G network infrastructure among operators offers an alternative solution to reducing the investment in the coverage phase of WCDMA. For radio access network (RAN) sh...
Salman AlQahtani, Ashraf S. Mahmoud, Asrar U. Shei...
130
Voted
CONCUR
2010
Springer
15 years 4 months ago
Buffered Communication Analysis in Distributed Multiparty Sessions
Many communication-centred systems today rely on asynchronous messaging among distributed peers to make efficient use of parallel execution and resource access. With such asynchron...
Pierre-Malo Deniélou, Nobuko Yoshida