Sciweavers

351 search results - page 48 / 71
» Formalisation and implementation of Access control models
Sort
View
103
Voted
RULEML
2005
Springer
15 years 6 months ago
A Semantic Web Framework for Interleaving Policy Reasoning and External Service Discovery
Enforcing rich policies in open environments will increasingly require the ability to dynamically identify external sources of information necessary to enforce different policies (...
Jinghai Rao, Norman M. Sadeh
85
Voted
DAIS
2003
15 years 1 months ago
Middleware Support for Resource-Constrained Software Deployment
Abstract The JAMUS platform is dedicated to providing a safe runtime environment for untrusted Java application programs, while offering each of these programs access to the resour...
Nicolas Le Sommer, Frédéric Guidec
TISSEC
2010
142views more  TISSEC 2010»
14 years 7 months ago
A logical specification and analysis for SELinux MLS policy
The SELinux mandatory access control (MAC) policy has recently added a multi-level security (MLS) model which is able to express a fine granularity of control over a subject'...
Boniface Hicks, Sandra Rueda, Luke St. Clair, Tren...
121
Voted
PC
1998
125views Management» more  PC 1998»
15 years 5 days ago
A High-Performance Active Digital Library
We describe Javaflow and Paraflow, the client and server parts of a digital library, providing high-performance data-retrieval and data-mining services, with emphasis on user in...
Roy Williams, Bruce Sears
ECRTS
1999
IEEE
15 years 4 months ago
Adding local priority-based dispatching mechanisms to P-NET networks: a fixed priority approach
In this paper we address the real-time capabilities of P-NET, which is a multi-master fieldbus standard based on a virtual token passing scheme. We show how P-NET's medium ac...
Eduardo Tovar, Francisco Vasques, Alan Burns