Sciweavers

51 search results - page 3 / 11
» Use of Roles and Policies for Specifying and Managing a Virt...
Sort
View
POLICY
2007
Springer
13 years 11 months ago
Call Management Policy Specification for the Asterisk Telephone Private Branch Exchange
A VoIP PBX supports flexible call handling functionality for selective forwarding, cost based outward call routing, recording calls etc. Both users and administrators need a flexi...
George Konstantoulakis, Morris Sloman
EDOC
2000
IEEE
13 years 9 months ago
Ponder: Realising Enterprise Viewpoint Concepts
This paper introduces the Ponder language for specifying distributed object enterprise concepts. Ponder, is a declarative language, which permits the specification of policies in ...
Emil Lupu, Morris Sloman, Naranker Dulay, Nicodemo...
TKDE
2008
177views more  TKDE 2008»
13 years 5 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...
CSFW
2006
IEEE
13 years 11 months ago
Policy Analysis for Administrative Role Based Access Control
Role-Based Access Control (RBAC) is a widely used model for expressing access control policies. In large organizations, the RBAC policy may be collectively managed by many adminis...
Amit Sasturkar, Ping Yang, Scott D. Stoller, C. R....
TDSC
2008
152views more  TDSC 2008»
13 years 5 months ago
Towards Formal Verification of Role-Based Access Control Policies
Specifying and managing access control policies is a challenging problem. We propose to develop formal verification techniques for access control policies to improve the current s...
Somesh Jha, Ninghui Li, Mahesh V. Tripunitara, Qih...