Sciweavers

151 search results - page 2 / 31
» On Testing for Absence of Rights in Access Control Models
Sort
View
EMISAIJ
2010
13 years 19 days ago
The Proviado Access Control Model for Business Process Monitoring Components
Integrated process support is highly desirable in environments where data related to a particular business process are scattered over distributed, heterogeneous information system...
Manfred Reichert, Sarita Bassil, Ralph Bobrik, Tho...
ICIS
2004
13 years 7 months ago
Are Digital Rights Valuable? Theory and Evidence from the eBook Industry
The effective management of digital rights is a crucial challenge in many industries making the transition from physical to digital products. We present an economic model that cha...
Gal Oestreicher-Singer, Arun Sundararajan
ICST
2008
IEEE
14 years 5 days ago
Model-Based Tests for Access Control Policies
We present a model-based approach to testing access control requirements. By using combinatorial testing, we first automatically generate test cases from and without access contro...
Alexander Pretschner, Tejeddine Mouelhi, Yves Le T...
SUTC
2006
IEEE
13 years 11 months ago
The Computational Complexity of Enforceability Validation for Generic Access Control Rules
In computer security, many researches have tackled on the possibility of a unified model of access control, which could enforce any access control policies within a single unified...
Vincent C. Hu, D. Richard Kuhn, David F. Ferraiolo
CSFW
1995
IEEE
13 years 9 months ago
Implementation of a discretionary access control model for script-based systems
Powerful applications can be implemented using command scripts. A command script is a program written by one user, called a writer, and made available to another user, called the ...
Trent Jaeger, Atul Prakash