Sciweavers

852 search results - page 9 / 171
» Model-Checking Access Control Policies
Sort
View
DNIS
2005
Springer
89views Database» more  DNIS 2005»
15 years 9 months ago
Policies, Models, and Languages for Access Control
Access control is the process of mediating every request to data and services maintained by a system and determining whether the request should be granted or denied. Expressiveness...
Sabrina De Capitani di Vimercati, Pierangela Samar...
ICDE
2003
IEEE
162views Database» more  ICDE 2003»
16 years 5 months ago
Dynamic Access Control Framework Based On Events
Access Control policies in e-commerce domain can be quite complex, affecting the response time provided to the users. We describe an event-based access control system that can pot...
Manish Bhide, Sandeep Pandey, Ajay Gupta 0004, Muk...
SIS
2008
15 years 5 months ago
Network Access Control Interoperation using Semantic Web Techniques
Network Access Control requirements are typically implemented in practice as a series of heterogeneous security-mechanism-centric policies that span system services and application...
William M. Fitzgerald, Simon N. Foley, Mích...
STTT
2008
134views more  STTT 2008»
15 years 4 months ago
Automated verification of access control policies using a SAT solver
Abstract. Managing access control policies in modern computer systems can be challenging and error-prone. Combining multiple disparate access policies can introduce unintended cons...
Graham Hughes, Tevfik Bultan
ICCS
2001
Springer
15 years 8 months ago
The Policy Machine for Security Policy Management
Abstract. Many different access control policies and models have been developed to suit a variety of goals; these include Role-Based Access Control, One-directional Information Flo...
Vincent C. Hu, Deborah A. Frincke, David F. Ferrai...