Howell et al., 2000 - Google Patents
{End-to-End} AuthorizationHowell et al., 2000
View PDF- Document ID
- 12904711186959482593
- Author
- Howell J
- Kotz D
- Publication year
- Publication venue
- Fourth Symposium on Operating Systems Design and Implementation (OSDI 2000)
External Links
Snippet
Many boundaries impede the flow of authorization information, forcing applications that span those boundaries into hop-by-hop approaches to authorization. We present a unified approach to authorization. Our approach allows applications that span administrative …
- 241000533950 Leucojum 0 description 51
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Howell et al. | {End-to-End} Authorization | |
JP4445698B2 (en) | Virtual distributed security system | |
Samar | Single sign-on using cookies for Web applications | |
Thompson et al. | Certificate-based access control for widely distributed resources | |
Bhargavan et al. | TulaFale: A security tool for web services | |
US20030126464A1 (en) | Method and system for determining and enforcing security policy in a communication session | |
US20030074579A1 (en) | Virtual distributed security system | |
KR20120128674A (en) | Secure dynamic authority delegation | |
KR20040068106A (en) | Provisioning aggregated services in a distributed computing environment | |
Bauer | Access control for the web via proof-carrying authorization | |
US7644270B1 (en) | Web services security architecture | |
Lopez et al. | Integrating PMI services in CORBA applications | |
Priyadharshini et al. | A framework for securing web services by formulating an collaborative security standard among prevailing WS-* security standards | |
Kumar | Model driven security analysis of IDaaS protocols | |
Tobarra et al. | Application of formal methods to the analysis of web services security | |
Xu et al. | Development of a flexible PERMIS authorisation module for Shibboleth and Apache server | |
Weeks et al. | CCI-Based Web security: a design using PGP | |
Ivan et al. | Using views for customizing reusable components in component-based frameworks | |
Jacob et al. | PKIX-based certification infrastructure implementation adapted to non-personal end entities | |
Stefas | Decentralized authorization for web services | |
Bellavista et al. | Security in programmable network infrastructures: the integration of network and application solutions | |
McDaniel et al. | Enforcing provisioning and authorization policy in the antigone system | |
Kostopoulos et al. | State-of-the-Art Security in Grid Computing | |
Gevers et al. | Privacy friendly information disclosure | |
Brooke et al. | Core Grid Functions: A minimal Architecture for Grids |