Usage control in computer security: A survey
Protecting access to digital resources is one of the fundamental problems recognized in
computer security. As yet it remains a challenging problem to work out, starting from the …
computer security. As yet it remains a challenging problem to work out, starting from the …
A survey of trust in workflows and relevant contexts
W Viriyasitavat, A Martin - IEEE Communications Surveys & …, 2011 - ieeexplore.ieee.org
With the fast-growing Internet technology, several service-based interactions are prevalent
and appear in several forms such as e-commerce, content provider, Virtual Organizations …
and appear in several forms such as e-commerce, content provider, Virtual Organizations …
[HTML][HTML] A domain-specific language for the specification of UCON policies
AMR Quintero, SM Pérez, ÁJ Varela-Vaca… - Journal of information …, 2022 - Elsevier
Security policies constrain the behavior of all users of an information system. In any non-
trivial system, these security policies go beyond simple access control rules and must cover …
trivial system, these security policies go beyond simple access control rules and must cover …
Cloud service negotiation framework for real-time E-commerce application using game theory decision system
R Rajavel, SK Ravichandran… - Journal of Intelligent …, 2021 - content.iospress.com
A major demanding issue is developing a Service Level Agreement (SLA) based negotiation
framework in the cloud. To provide personalized service access to consumers, a novel …
framework in the cloud. To provide personalized service access to consumers, a novel …
Extending Security-by-Contract with quantitative trust on mobile devices
Security-by-Contract (S× C) is a paradigm providing security assurances for mobile
applications. In this work, we present an extension of S× C enriched with an automatic trust …
applications. In this work, we present an extension of S× C enriched with an automatic trust …
Implementation of an Advanced Authentication Method within Microsoft Active Directory Network Services
J Kadlec, D Jaros, R Kuchta - 2010 6th International …, 2010 - ieeexplore.ieee.org
This paper describes a new approach for developing and implementing an advanced
authentication method within active directory network services. For advance authentication …
authentication method within active directory network services. For advance authentication …
A trust negotiation based security framework for service provisioning in load-balancing clusters
A Maña, H Koshutanski, EJ Pérez - computers & security, 2012 - Elsevier
The OKKAM project aims at enabling the Web of Entities, a global digital space for
publishing and managing information about entities. The project provides a scalable and …
publishing and managing information about entities. The project provides a scalable and …
Security-by-Contract-with-Trust for mobile devices
Security-by-Contract (S× C) is a paradigm providing security assurances for mobile
applications. In this work, we present the an extension of S× C, called Security-by-Contract …
applications. In this work, we present the an extension of S× C, called Security-by-Contract …
Applying Design Patterns in URI Strategies--Naming in Linked Geospatial Data Infrastructure
The centrality of Uniform Resource Identifiers (URI) as names in Linked Data initiatives has
led to the development of guidelines and best practices by World Wide Web Consortium …
led to the development of guidelines and best practices by World Wide Web Consortium …
[PDF][PDF] A survey of usage control in computer security
Protecting access to digital resources is one of the fundamental problems recognized in
computer security. It yet remains a challenging problem to work out starting from the …
computer security. It yet remains a challenging problem to work out starting from the …