Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Richard B. Ward is active.

Publication


Featured researches published by Richard B. Ward.


Archive | 2004

A Conceptual Authorization Model for Web Services

Paul J. Leach; Blair B. Dillaway; Praerit Garg; Chris Kaler; Brian A. Lamacchia; Butler W. Lampson; John L. Manferdelli; Rick Rashid; John P. Shewchuk; Daniel R. Simon; Richard B. Ward

This paper describes a conceptual authorization model for Web Services. It is an adaptation of those of Taos [Lamp92] and SDSI [Lamp96] with terms changed to correspond more closely to those introduced with the WS-Security model [WS02]. In contrast to the more formal and mathematical presentation used for Taos and SDSI, this presentation is conceptual and informal, which hopefully may provide more intuition for some readers; it also might provide an outline for the class hierarchy of an object-oriented implementation. In addition, this model abstracts away from issues of distribution and network security such as authentication [Need78] and encryption (for example, by assuming that messages include the unforgeable identity of the sender and are private and tamperproof) so as to focus on authorization, but it does deal with the extensibility and composability of security services, and partial trust. It also


Archive | 2001

Schema-based services for identity-based data access

Mark H. Lucovsky; Shaun D. Pierce; Ramu Movva; Jagadeesh Kalki; David Benjamin Auerbach; Peter S. Ford; Yun-Qi Yuan; Yi-Wen Guu; Samuel John George; William R. Hoffman; Jay C. Jacobs; Paul A. Steckler; Walter C. Hsueh; Kendall D. Keil; Burra Gopal; Steven D. White; Paul J. Leach; Richard B. Ward; Philip Michael Smoot; Lijiang Fang; Michael B. Taylor; Suresh Kannan; Winnie C. Wu


Archive | 1998

Method and system for secure running of untrusted content

Shannon J. Chan; Gregory Jensenworth; Mario C. Goertzel; Bharat Shah; Michael M. Swift; Richard B. Ward


Archive | 1998

Extensible security system and method for controlling access to objects in a computing environment

Clifford P. Van Dyke; Peter T. Brundrett; Michael M. Swift; Praerit Garg; Richard B. Ward


Archive | 2000

System and method of user logon in combination with user authentication for network access

John E. Brezak; Richard B. Ward; Michael M. Swift; Paul J. Leach


Archive | 2003

Securely processing client credentials used for web-based access to resources

Shawn Derek Bracewell; Richard B. Ward; Russell L. Simpson; Karim Michel Batthish


Archive | 1994

Method and system for providing certificates holding authentication and authorization information for users/machines

Pradyumna K. Misra; Arnold S. Miller; Richard B. Ward


Archive | 2001

Methods and arrangements for protecting information in forwarded authentication messages

John E. Brezak; Richard B. Ward


Archive | 2001

Authorizing a requesting entity to operate upon data structures

Mark H. Lucovsky; Shaun D. Pierce; Michael G. Burner; Richard B. Ward; Paul J. Leach; George M. Moore; Arthur Zwiegincew; Robert M. Hyman; Jonathan D. Pincus; Daniel R. Simon


Archive | 2001

Methods and systems for controlling the scope of delegation of authentication credentials

John E. Brezak; Richard B. Ward; Donald E. Schmidt

Collaboration


Dive into the Richard B. Ward's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Michael M. Swift

University of Wisconsin-Madison

View shared research outputs
Researchain Logo
Decentralizing Knowledge