Sciweavers

2655 search results - page 60 / 531
» Event Systems and Access Control
Sort
View
ENTCS
2007
128views more  ENTCS 2007»
15 years 4 months ago
Rewriting-Based Access Control Policies
In this paper we propose a formalization of access control policies based on term rewriting. The state of the system to which policies are enforced is represented as an algebraic ...
Anderson Santana de Oliveira
STORAGESS
2006
ACM
15 years 10 months ago
Access control for a replica management database
Distributed computation systems have become an important tool for scientific simulation, and a similarly distributed replica management system may be employed to increase the loc...
Justin M. Wozniak, Paul Brenner, Douglas Thain
EMISAIJ
2010
14 years 11 months ago
The Proviado Access Control Model for Business Process Monitoring Components
Integrated process support is highly desirable in environments where data related to a particular business process are scattered over distributed, heterogeneous information system...
Manfred Reichert, Sarita Bassil, Ralph Bobrik, Tho...
USENIX
2003
15 years 5 months ago
The TrustedBSD MAC Framework: Extensible Kernel Access Control for FreeBSD 5.0
We explore the requirements, design, and implementation of the TrustedBSD MAC Framework. The TrustedBSD MAC Framework, integrated into FreeBSD 5.0, provides a flexible framework ...
Robert Watson, Wayne Morrison, Chris Vance, Brian ...
TRIDENTCOM
2005
IEEE
15 years 10 months ago
An Open Access Wideband Multi-Antenna Wireless Testbed with Remote Control Capability
This paper introduces an open access wideband multiantenna wireless testbed. The testbed is configured as a four transmit antenna by four receive antenna system based on software...
Weijun Zhu, David W. Browne, Michael P. Fitz