Sciweavers

80 search results - page 5 / 16
» A Policy Architecture for Enhancing and Controlling Features
Sort
View
SACMAT
2003
ACM
15 years 4 months ago
The role control center: features and case studies
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...
ISW
2009
Springer
15 years 6 months ago
Hardware-Assisted Application-Level Access Control
Abstract. Applications typically rely on the operating system to enforce access control policies such as MAC, DAC, or other policies. However, in the face of a compromised operatin...
Yu-Yuan Chen, Ruby B. Lee
CARDIS
2000
Springer
107views Hardware» more  CARDIS 2000»
15 years 4 months ago
JCCap: Capability-based Access Control for Java Card
: This paper describes JCCap, a protection facility for cooperating applications in the context of Java Card. It enables the control of access rights between mutually suspicious ap...
Daniel Hagimont, Jean-Jacques Vandewalle
TASE
2007
IEEE
15 years 5 months ago
Constraint-Based Policy Negotiation and Enforcement for Telco Services
Telco services are evolving under several aspects: for instance, services may combine different telecommunication features (messaging, multi-media, etc.) and may be activated and...
Maria Grazia Buscemi, Laura Ferrari, Corrado Moiso...
COMPSAC
2007
IEEE
15 years 6 months ago
Decision Support for Dynamic Adaptation of Business Systems Based on Feature Binding Analysis
Dynamic evolution has been an essential requirement for more and more business systems which attempt to provide 7(days) x 24(hours) availability and flexible adaptability on the c...
Liwei Shen, Xin Peng, Wenyun Zhao