Sciweavers

3899 search results - page 56 / 780
» Argumentation for Access Control
Sort
View
CSE
2009
IEEE
15 years 11 months ago
Reputation-Based Ontology Alignment for Autonomy and Interoperability in Distributed Access Control
Abstract—Vocabulary alignment is a main challenge in distributed access control as peers should understand each other’s policies unambiguously. Ontologies enable mutual underst...
Daniel Trivellato, Fred Spiessens, Nicola Zannone,...
SACMAT
2009
ACM
15 years 11 months ago
Ensuring spatio-temporal access control for real-world applications
Traditional access control models, such as Role-Based Access Control (RBAC), do not take into account contextual information, such as location and time, for making access decision...
Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anas...
ICST
2008
IEEE
15 years 11 months ago
Model-Based Tests for Access Control Policies
We present a model-based approach to testing access control requirements. By using combinatorial testing, we first automatically generate test cases from and without access contro...
Alexander Pretschner, Tejeddine Mouelhi, Yves Le T...
ICDCS
2003
IEEE
15 years 10 months ago
Integrated Access Control and Intrusion Detection for Web Servers
Current intrusion detection systems work in isolation from access control for the application the systems aim to protect. The lack of coordination and inter-operation between thes...
Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim, L...
139
Voted
SP
1996
IEEE
15 years 9 months ago
View-Based Access Control with High Assurance
View-based access control enables content-based and context-based security, as opposed to container-based security provided in operating systems. However, view-based access contro...
Xiaolei Qian