Sciweavers

427 search results - page 4 / 86
» Implementing Real-Time Update of Access Control Policies
Sort
View
153
Voted
RTAS
2000
IEEE
15 years 8 months ago
Evaluating Policies and Mechanisms for Supporting Embedded, Real-Time Applications with CORBA 3.0
To be an effective platform for performance-sensitive realtime systems, commercial-off-the-shelf (COTS) distributed object computing (DOC) middleware must support application qual...
Carlos O'Ryan, Douglas C. Schmidt, Fred Kuhns, Mar...
175
Voted
CSREAESA
2006
15 years 5 months ago
Integration of an Analysis Tool for Large-Scale Embedded Real-Time Software into a Vehicle Control Platform Development Tool Cha
- We present a software tool for high-level design and analysis of large-scale embedded real-time software, which has been integrated into a vehicle control platform development to...
Xiaofeng Yin, Daniel L. Kiskis, Daniel Mihalik, Ka...
145
Voted
CHI
2011
ACM
14 years 7 months ago
Exploring reactive access control
As users store and share more digital content at home, access control becomes increasingly important. One promising approach for helping non-expert users create accurate access po...
Michelle L. Mazurek, Peter F. Klemperer, Richard S...
122
Voted
EDBT
2008
ACM
137views Database» more  EDBT 2008»
16 years 3 months ago
ACCOn: checking consistency of XML write-access control policies
XML access control policies involving updates may contain security flaws, here called inconsistencies, in which a forbidden operation may be simulated by performing a sequence of ...
Loreto Bravo, James Cheney, Irini Fundulaki
151
Voted
SECURWARE
2008
IEEE
15 years 10 months ago
Fast Algorithms for Local Inconsistency Detection in Firewall ACL Updates
Filtering is a very important issue in next generation networks. These networks consist of a relatively high number of resource constrained devices with very special features, suc...
Sergio Pozo Hidalgo, Rafael Ceballos, Rafael M. Ga...