Sciweavers

769 search results - page 62 / 154
» Policy Storage for Role-Based Access Control Systems
Sort
View
SC
1993
ACM
15 years 3 months ago
The high performance storage system
The High Performance Storage System (HPSS) is a mature Hierarchical Storage Management (HSM) system that was developed around a network-centered architecture, with client access t...
Robert A. Coyne, Harry Hulen, Richard Watson
83
Voted
CDC
2010
IEEE
112views Control Systems» more  CDC 2010»
14 years 6 months ago
Dynamic product assembly and inventory control for maximum profit
We consider a manufacturing plant that purchases raw materials for product assembly and then sells the final products to customers. There are M types of raw materials and K types o...
Michael J. Neely, Longbo Huang
IEEEARES
2010
IEEE
15 years 6 months ago
Patterns for Secure Boot and Secure Storage in Computer Systems
—Trusted Computing aims at enhancing the security of IT systems by using a combination of trusted hardware and software components to provide security guarantees. This includes s...
Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
ESWS
2010
Springer
15 years 3 months ago
Reactive Policies for the Semantic Web
Semantic Web policies are general statements defining the behavior of a system that acts on behalf of real users. These policies have various applications ranging from dynamic age...
Piero A. Bonatti, Philipp Kärger, Daniel Olme...
72
Voted
ACSAC
2009
IEEE
15 years 5 months ago
How to Securely Break into RBAC: The BTG-RBAC Model
—Access control models describe frameworks that dictate how subjects (e.g. users) access resources. In the Role-Based Access Control (RBAC) model access to resources is based on ...
Ana Ferreira, David W. Chadwick, Pedro Farinha, Ri...