Sciweavers

882 search results - page 52 / 177
» On the Negotiation of Access Control Policies
Sort
View
118
Voted
ECOOP
1999
Springer
15 years 2 months ago
Providing Fine-grained Access Control for Java Programs
There is considerable interest in programs that can migrate from one host to another and execute. Mobile programs are appealing because they support efficient utilization of networ...
Raju Pandey, Brant Hashii
76
Voted
ACSAC
2006
IEEE
15 years 4 months ago
Shamon: A System for Distributed Mandatory Access Control
We define and demonstrate an approach to securing distributed computation based on a shared reference monitor (Shamon) that enforces mandatory access control (MAC) policies acros...
Jonathan M. McCune, Trent Jaeger, Stefan Berger, R...
MMMACNS
2005
Springer
15 years 3 months ago
Foundation for a Time Interval Access Control Model
A new model for representing temporal access control policies is introduced. In this model, temporal authorizations are represented by time attributes associated with both subjects...
Francis B. Afinidad, Timothy E. Levin, Cynthia E. ...
114
Voted
ACISP
2003
Springer
15 years 3 months ago
A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems
Abstract. This paper examines the access control requirements of distributed health care information networks. Since the electronic sharing of an individual’s personal health inf...
Jason Reid, Ian Cheong, Matthew Henricksen, Jason ...
81
Voted
ICRA
2008
IEEE
197views Robotics» more  ICRA 2008»
15 years 4 months ago
Approximate optimal control of the compass gait on rough terrain
Abstract— In this paper, we explore the capabilities of actuated models of the compass gait walker on rough terrain. We solve for the optimal high-level feedback policy to negoti...
Katie Byl, Russ Tedrake