The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Trust-based access is an established technique in many fields, such as networks and distributed systems, but has not previously been used for XML (Extensible Markup Language) databases. In trust-based access control, user privileges are calculated dynamically depending on the user's trust value. Applying the technique to XML databases should have many advantages over current techniques, such as role-based...
Web Services are at the heart of many Internet-based e-business systems. Security issues in web services are critical for the continuity of the provided services. Solutions such as Role-Based Access Control and Trust-Based Access Control were proposed to address threats to security in single Web Service scenarios. These solutions do not fully provide the required security level in situations related...
Currently, with the popularization of the computer and Internet technologies, electronic documents have become the most important resource in enterprises or organizations. The security of documents and protecting the information resident in these documents is of paramount importance to the organizationpsilas progress and in some cases, their survival too. Hence, electronic documents are the target...
The seamless combining with context-aware sensors and numerous devices and e-home server will soon become a part of our home environment in the near future. We name it as a context-aware home based on ubiquitous computing concept. This context-aware home reduces participations of users in order to realize a ubiquitous computing and automates various services. Therefore, the risk of privacy violation...
Linear Discriminant Analysis (LDA) is one of the most used feature extraction techniques for face recognition. However, it often suffers from the small sample size problem with high dimension setting. Random Subspace Method (RSM) is a popular combining technique to improve weak classifier. Nevertheless, it remains a problem how to construct an optimal random subspace for discriminant analysis. In...
We present a new approach for mutation analysis of security policies test cases. We propose a metamodel that provides a generic representation of security policies access control models and define a set of mutation operators at this generic level. We use Kermeta to build the metamodel and implement the mutation operators. We also illustrate our approach with two successful instantiation of this metamodel:...
Security policy validation based on conformance testing is a promising approach, but it lacks both of a fault model and of better test selection procedures. Penetration testing approaches rely on a fault model based on the exploitation of sequences of vulnerabilities. This document proposes a method to generate test purposes to validate the conformance of a system to a security policy using a fault...
The UNICORE grid system provides a seamless, secure and intuitive access to distributed grid resources. In recent years, UNICORE 5 is used as a well-tested grid middleware system in production grids (e.g. DEISA, D-Grid) and at many supercomputer centers world-wide. Beyond this production usage, UNICORE serves as a solid basis in many European and International research projects and business scenarios...
This is an introduction to the proceedings of the MWS 2007 workshop held at EDOC 2007. It first explains the motivation for and background of the workshop. Then, it contains a short description of the keynote, each long and short peer-reviewed paper, and the discussion session "impact of various execution environments on middleware for web services". After the closing statements, MWS 2007...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.