Sciweavers

78 search results - page 10 / 16
» A Perspective on Graphs and Access Control Models
Sort
View
TMC
2010
115views more  TMC 2010»
14 years 8 months ago
Controlled Wi-Fi Sharing in Cities: A Decentralized Approach Relying on Indirect Reciprocity
—In densely populated cities, Wi-Fi networks—private or otherwise—are ubiquitous. We focus on the provision of citywide broadband communication capability to mobile users thr...
Elias C. Efstathiou, Pantelis A. Frangoudis, Georg...
RE
2005
Springer
15 years 3 months ago
An Algebraic Framework for Merging Incomplete and Inconsistent Views
View merging, also called view integration, is a key problem in conceptual modeling. Large models are often constructed and accessed by manipulating individual views, but it is im...
Mehrdad Sabetzadeh, Steve M. Easterbrook
88
Voted
SACMAT
2009
ACM
15 years 2 months ago
A formal framework to elicit roles with business meaning in RBAC systems
The role-based access control (RBAC) model has proven to be cost effective to reduce the complexity and costs of access permission management. To maximize the advantages offered...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
DBSEC
2004
170views Database» more  DBSEC 2004»
14 years 11 months ago
RBAC/MAC Security Analysis and Design for UML
In software construction, analysis investigates the boundary of a system (scope and requirements), its usage and access, and from a security perspective, who needs access to what ...
Thuong Doan, Steven A. Demurjian, Charles E. Phill...
CUZA
2002
129views more  CUZA 2002»
14 years 9 months ago
Ad Hoc Metacomputing with Compeer
Metacomputing allows the exploitation of geographically seperate, heterogenous networks and resources. Most metacomputers are feature rich and carry a long, complicated installati...
Keith Power, John P. Morrison