Sciweavers

769 search results - page 91 / 154
» Policy Storage for Role-Based Access Control Systems
Sort
View
ICST
2009
IEEE
15 years 5 months ago
Transforming and Selecting Functional Test Cases for Security Policy Testing
In this paper, we consider typical applications in which the business logic is separated from the access control logic, implemented in an independent component, called the Policy ...
Tejeddine Mouelhi, Yves Le Traon, Benoit Baudry
DRM
2003
Springer
15 years 4 months ago
Experiences with the enforcement of access rights extracted from ODRL-based digital contracts
In this paper, we present our experiences concerning the enforcement of access rights extracted from ODRL-based digital contracts. We introduce the generalized Contract Schema (Co...
Susanne Guth, Gustaf Neumann, Mark Strembeck
ECTEL
2007
Springer
15 years 5 months ago
Exploiting Policies in an Open Infrastructure for Lifelong Learning
Nowadays, people are in need for continuous learning in order to keep up to date or be upgraded in their job. An infrastructure for lifelong learning requires continuous adaptation...
Juri Luca De Coi, Philipp Kärger, Arne Wolf K...
81
Voted
IADIS
2004
15 years 13 days ago
Using SPKI/SDSI for Distributed Maintenance of Attribute Release Policies in Shibboleth
The Shibboleth middleware from Internet2 provides a way for users at higher-education institutions to access remote electronic content in compliance with the inter-institutional l...
Sidharth Nazareth, Sean W. Smith
STORAGESS
2005
ACM
15 years 4 months ago
Expecting the unexpected: adaptation for predictive energy conservation
The use of access predictors to improve storage device performance has been investigated for both improving access times, as well as a means of reducing energy consumed by the dis...
Jeffrey P. Rybczynski, Darrell D. E. Long, Ahmed A...