Sciweavers

370 search results - page 29 / 74
» Enforcing Access Control Using Risk Assessment
Sort
View
RR
2010
Springer
15 years 9 days ago
Query-Based Access Control for Ontologies
Role-based access control is a standard mechanism in information systems. Based on the role a user has, certain information is kept from the user even if requested. For ontologies ...
Martin Knechtel, Heiner Stuckenschmidt
CCS
2005
ACM
15 years 7 months ago
Control-flow integrity
Current software attacks often build on exploits that subvert machine-code execution. The enforcement of a basic safety property, Control-Flow Integrity (CFI), can prevent such at...
Martín Abadi, Mihai Budiu, Úlfar Erl...
ACSAC
2003
IEEE
15 years 7 months ago
A Policy Validation Framework for Enterprise Authorization Specification
The validation of enterprise authorization specification for conformance to enterprise security policies requires an out-of-band framework in many situations since the enforcing a...
Ramaswamy Chandramouli
SEC
2007
15 years 3 months ago
A Middleware Architecture for Integrating Privacy Preferences and Location Accuracy
Location-Based Access Control (LBAC) systems support the evaluation of conditions on locations in the enforcement of access control policies. The ability to evaluate conditions on ...
Claudio Agostino Ardagna, Marco Cremonini, Ernesto...
SIGCSE
2005
ACM
192views Education» more  SIGCSE 2005»
15 years 7 months ago
Ubiquitous presenter: increasing student access and control in a digital lecturing environment
The University of Washington’s Classroom Presenter lecturing system enables an active lecturing environment by combining a standard electronic slide presentation format with the...
Michelle Wilkerson, William G. Griswold, Beth Simo...