Sciweavers

351 search results - page 22 / 71
» Formalisation and implementation of Access control models
Sort
View
96
Voted
IFIP
2004
Springer
15 years 5 months ago
A Formal Approach to Specify and Deploy a Network Security Policy
Current firewall configuration languages have no well founded semantics. Each firewall implements its own algorithm that parses specific proprietary languages. The main conseq...
Frédéric Cuppens, Nora Cuppens-Boula...
115
Voted
DSRT
1999
IEEE
15 years 4 months ago
Distributed Interaction in Virtual Spaces
Virtual spaces based on the metaphor of "shared network places" are becoming a well accepted implementation approach for multiuser, multimedia, distributed cooperative w...
Alois Ferscha, James Johnson
113
Voted
SACMAT
2010
ACM
14 years 11 months ago
Enforcing spatial constraints for mobile RBAC systems
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the administrative and security advantages of RBAC with the dynamic nature of mobile and...
Michael S. Kirkpatrick, Elisa Bertino
91
Voted
ICC
2007
IEEE
15 years 6 months ago
A Grammar for Specifying Usage Control Policies
—Usage control goes beyond traditional access control, addressing its limitations related to attribute mutability and continuous usage permission validation. The recently propose...
Rafael Teigao, Carlos Maziero, Altair Olivo Santin
ER
1999
Springer
152views Database» more  ER 1999»
15 years 4 months ago
Semantically Accessing Documents Using Conceptual Model Descriptions
. When publishing documents on the web, the user needs to describe and classify her documents for the benefit of later retrieval and use. This paper presents an approach to semanti...
Terje Brasethvik, Jon Atle Gulla