Sciweavers

370 search results - page 7 / 74
» Enforcing Access Control Using Risk Assessment
Sort
View
IEEEARES
2010
IEEE
15 years 6 months ago
Strategies for Reducing Risks of Inconsistencies in Access Control Policies
—Managing access control policies is a complex task. We argue that much of the complexity is unnecessary and mostly due to historical reasons. There are number of legacy policy s...
Bernard Stepien, Stan Matwin, Amy P. Felty
HOTOS
1999
IEEE
15 years 4 months ago
Flexible Access Control using IPC Redirection
We present a mechanism for inter-process communication (IPC) redirection that enables efficient and flexible access control for micro-kernel systems. In such systems, services are...
Trent Jaeger, Kevin Elphinstone, Jochen Liedtke, V...
DBSEC
2009
110views Database» more  DBSEC 2009»
15 years 22 days ago
Distributed Privilege Enforcement in PACS
Abstract. We present a new access control mechanism for P2P networks with distributed enforcement, called P2P Access Control System (PACS). PACS enforces powerful access control mo...
Christoph Sturm, Ela Hunt, Marc H. Scholl
ESOP
2003
Springer
15 years 4 months ago
Using Controller-Synthesis Techniques to Build Property-Enforcing Layers
In complex systems, like robot plants, applications are built on top of a set of components, or devices. Each of them has particular individual constraints, and there are also log...
Karine Altisen, Aurélie Clodic, Florence Ma...
72
Voted
SAC
2002
ACM
14 years 11 months ago
An agreement centric access control mechanism for business to business e-commerce
We argue that matrix-based models are inadequate for regulating business to business (or B2B, for short) e-commerce due to the diversity, complexity and potential large number of ...
Victoria Ungureanu