Sciweavers

32 search results - page 6 / 7
» Compositional Refinement of Policies in UML - Exemplified fo...
Sort
View
RTSS
2008
IEEE
13 years 11 months ago
Predictable Interrupt Management and Scheduling in the Composite Component-Based System
This paper presents the design of user-level scheduling hierarchies in the Composite component-based system. The motivation for this is centered around the design of a system that...
Gabriel Parmer, Richard West
RBAC
1998
84views more  RBAC 1998»
13 years 6 months ago
Decentralized User-role Assignment for Web-based Intranets
The intricacy of security administration is one of the most challenging problems in large networked systems. This problem is especially serious in the Web environment, which consi...
Ravi S. Sandhu, Joon S. Park
TGC
2005
Springer
13 years 11 months ago
A Practical Formal Model for Safety Analysis in Capability-Based Systems
Abstract. We present a formal system that models programmable abstractions for access control. Composite abstractions and patterns of arbitrary complexity are modeled as a configu...
Fred Spiessens, Peter Van Roy
CCS
2008
ACM
13 years 7 months ago
Flexible and secure enterprise rights management based on trusted virtual domains
The requirements for secure document workflows in enterprises become increasingly sophisticated, with employees performing different tasks under different roles using the same pro...
Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, ...
MIDDLEWARE
2007
Springer
13 years 11 months ago
A service-oriented virtual community overlay network for secure external service orchestration
The Service Oriented Architecture (SOA) is used extensively in ubiquitous computing environments. Using external service orchestration, services can be composed into applications....
Shudong Chen, Johan J. Lukkien