Sciweavers

1357 search results - page 27 / 272
» Controlling Access to Documents: A Formal Access Control Mod...
Sort
View
IJSEKE
2011
165views more  IJSEKE 2011»
14 years 3 months ago
Model Checking for Verification of Mandatory Access Control Models and Properties
rather wide gap in abstraction between policies and mechanisms. In this paper, we propose a general approach for property verification for MAC models. The approach defines a stan...
Vincent C. Hu, D. Richard Kuhn, Tao Xie, JeeHyun H...
SACMAT
2009
ACM
15 years 4 months ago
A formal framework to elicit roles with business meaning in RBAC systems
The role-based access control (RBAC) model has proven to be cost effective to reduce the complexity and costs of access permission management. To maximize the advantages offered...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
DSS
2006
140views more  DSS 2006»
14 years 11 months ago
Access control and audit model for the multidimensional modeling of data warehouses
Due to the sensitive data contained in Data Warehouses (DW), it is essential to specify security measures from the early stages of the DW design and enforce them. Traditional acce...
Eduardo Fernández-Medina, Juan Trujillo, Ro...
IJCSA
2006
77views more  IJCSA 2006»
14 years 11 months ago
Formal Approach for the Coherence Control of SMIL Documents
This paper presents a formal approach based on Time Petri net (TPN) for the coherence control of SMIL documents. TPN model has been widely used to specify real time systems. The q...
S. Mazouz, D. Dahmani, L. Kaddouri
XMLSEC
2003
ACM
15 years 5 months ago
First experiences using XACML for access control in distributed systems
Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as com...
Markus Lorch, Seth Proctor, Rebekah Lepro, Dennis ...