Sciweavers

195 search results - page 24 / 39
» How Role Based Access Control is Implemented in SESAME
Sort
View
CCS
2011
ACM
13 years 9 months ago
Automatic error finding in access-control policies
Verifying that access-control systems maintain desired security properties is recognized as an important problem in security. Enterprise access-control systems have grown to prote...
Karthick Jayaraman, Vijay Ganesh, Mahesh V. Tripun...
SACMAT
2003
ACM
15 years 2 months ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck
ROBOCOMM
2007
IEEE
15 years 3 months ago
Distributed control diffusion: towards a flexible programming paradigm for modular robots
—A self-reconfigurable robot is a robotic device that can change its own shape. Self-reconfigurable robots are commonly built from multiple identical modules that can manipulat...
Ulrik Pagh Schultz
ICRA
2005
IEEE
97views Robotics» more  ICRA 2005»
15 years 3 months ago
Cognitive Based Neural Prosthetics
– Intense activity in neural prosthetic research has recently demonstrated the possibility of robotic interfaces that respond directly to the nervous system. The question remains...
Richard A. Andersen, Sam Musallam, Joel W. Burdick...
SIGMOD
2004
ACM
123views Database» more  SIGMOD 2004»
15 years 2 months ago
Model-Driven Business UI based on Maps
Future business applications will often have more than 2,000 forms and need to target several user interface (UI) technologies including: Web Browsers, Windows® Applications, PDA...
Per Bendsen