Sciweavers

852 search results - page 22 / 171
» Model-Checking Access Control Policies
Sort
View
125
Voted
TKDE
2008
177views more  TKDE 2008»
15 years 1 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...
133
Voted
IJNSEC
2010
145views more  IJNSEC 2010»
14 years 8 months ago
Formal Specification of Common Criteria Based Access Control Policy Model
One of the major threats that an enterprise Information system networks are facing today is the Insider threat. As part of the Insider Threat study, lack of an effective access co...
Manpreet Singh, Manjeet S. Patterh
INFOCOM
2003
IEEE
15 years 7 months ago
Congestion Control Policies for IP-based CDMA Radio Access Networks
— As CDMA-based cellular networks mature, the current point-to-point links used in connecting base stations to network controllers will evolve to an IP-based Radio Access Network...
Sneha Kumar Kasera, Ramachandran Ramjee, Sandra R....
118
Voted
CSFW
2006
IEEE
15 years 8 months ago
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies
There is a growing interest in establishing rules to regulate the privacy of citizens in the treatment of sensitive personal data such as medical and financial records. Such rule...
Michael J. May, Carl A. Gunter, Insup Lee
111
Voted
ACSAC
2008
IEEE
15 years 8 months ago
Enforcing Role-Based Access Control Policies in Web Services with UML and OCL
Karsten Sohr, Tanveer Mustafa, Xinyu Bao, Gail-Joo...