Sciweavers

804 search results - page 12 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
CCS
2003
ACM
15 years 2 months ago
Formal access control analysis in the software development process
Security is a crucial aspect in any modern software system. To ensure security in the final product, security requirements must be considered in the entire software development p...
Manuel Koch, Francesco Parisi-Presicce
75
Voted
RTCSA
2006
IEEE
15 years 3 months ago
Jitter Evaluation of Real-Time Control Systems
The real-time implementation of a controller typically introduces artefacts like delay and jitters that have not been considered at the design stage. As a consequence, the system ...
Manuel Lluesma, Anton Cervin, Patricia Balbastre, ...
WORDS
2002
IEEE
15 years 2 months ago
Role-Based Access Control for CORBA Distributed Object Systems
This paper shows how role-based access control (RBAC) models can be implemented in distributed object-based systems that follow OMG/CORBA standards. We introduce a novel approach ...
Rafael R. Obelheiro, Joni da Silva Fraga
ACSAC
2006
IEEE
15 years 3 months ago
Using Attribute-Based Access Control to Enable Attribute-Based Messaging
Attribute Based Messaging (ABM) enables message senders to dynamically create a list of recipients based on their attributes as inferred from an enterprise database. Such targeted...
Rakeshbabu Bobba, Omid Fatemieh, Fariba Khan, Carl...
SIGDOC
1999
ACM
15 years 1 months ago
Role-based access control in online authoring and publishing systems vs. document hierarchy
How to structure diverse (documentation) information sources of an enterprise and how to arrange a workflow with access control are two important issues for online authoring and p...
Zhongdong Zhang, Ernst Georg Haffner, Andreas Heue...