Sciweavers

670 search results - page 1 / 134
» A RBAC-Based Policy Information Base
Sort
View
CSREASAM
2009
13 years 6 months ago
Incremental Information Flow Analysis of Role Based Access Control
Role-Based Access Control (RBAC) has been widely used for expressing access control policies. Although RBAC provides flexible mechanisms to control the access to information, it do...
Mikhail I. Gofman, Ruiqi Luo, Jian He, Yingbin Zha...
CSREAPSC
2006
13 years 6 months ago
A Policy-Based Location Identification Architecture for Pervasive Systems
In this paper, we present a policy-based architecture to be used in identifying the location of users within a pervasive system environment. Mobile users can define their own poli...
Sherif G. Aly
DBSEC
2009
124views Database» more  DBSEC 2009»
13 years 6 months ago
Towards System Integrity Protection with Graph-Based Policy Analysis
Abstract. Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security po...
Wenjuan Xu, Xinwen Zhang, Gail-Joon Ahn
DSOM
2006
Springer
13 years 8 months ago
Ontology-Based Policy Refinement Using SWRL Rules for Management Information Definitions in OWL
Abstract. The goal of ontology-based management is to improve the manageability of network resources through the application of formal ontologies. Prior research work has studied t...
Antonio Guerrero, Víctor A. Villagrá...
AISS
2010
114views more  AISS 2010»
13 years 2 months ago
Context Awareness Information Sharing Service based on Location-based Communication Policy
Since more networking technologies and communication channels have been developed, Internet users have moved their roles from being strictly information consumers to both informat...
Yih-Jiun Lee