Sciweavers

2655 search results - page 8 / 531
» Event Systems and Access Control
Sort
View
COMPSAC
2006
IEEE
15 years 3 months ago
A Pattern-Based Technique for Developing UML Models of Access Control Systems
This paper describes a pattern-based technique for systematic development of UML models of secure systems using access control. Access control is viewed and specified as a design...
Dae-Kyoo Kim, Priya Gokhale
ISORC
2003
IEEE
15 years 2 months ago
The Event-Triggered and Time-Triggered Medium-Access Methods
The processes of accessing a shared communication media have been extensively researched in the dependability and real-time area. For embedded systems, the primary approaches have...
Vilgot Claesson, Cecilia Ekelin, Neeraj Suri
CN
2000
76views more  CN 2000»
14 years 9 months ago
Supporting reconfigurable security policies for mobile programs
Programming models that support code migration have gained prominence, mainly due to a widespread shift from stand-alone to distributed applications. Although appealing in terms o...
Brant Hashii, Scott Malabarba, Raju Pandey, Matt B...
SACMAT
2006
ACM
15 years 3 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
ICCS
2004
Springer
15 years 2 months ago
An Application of the DEDS Control Synthesis Method
Abstract: An application of the method suitable for modelling and control of general discrete event dynamic systems (DEDS) to special kinds of communication systems is presented in...
Frantisek Capkovic