Sciweavers

926 search results - page 78 / 186
» Policy framings for access control
Sort
View
MEDINFO
2007
131views Healthcare» more  MEDINFO 2007»
15 years 14 days ago
Utilizing SELinux to Mandate Ultra-secure Access Control of Medical Records
Ongoing concerns have been raised over the effectiveness of information technology products and systems in maintaining privacy protection for sensitive data. The aim is to ensure ...
Peter R. Croll, Matthew Henricksen, William J. Cae...
SP
2005
IEEE
149views Security Privacy» more  SP 2005»
15 years 4 months ago
Distributed Proving in Access-Control Systems
We present a distributed algorithm for assembling a proof that a request satisfies an access-control policy expressed in a formal logic, in the tradition of Lampson et al. [16]. ...
Lujo Bauer, Scott Garriss, Michael K. Reiter
NDSS
2003
IEEE
15 years 4 months ago
Access Control Based on Execution History
Security is a major, frequent concern in extensible software systems such as Java Virtual Machines and the Common Language Runtime. These systems aim to enable simple, classic app...
Martín Abadi, Cédric Fournet
93
Voted
ICWS
2008
IEEE
15 years 15 days ago
A Theory of Role Composition
We study the access control integration problem for web services. Organizations frequently use many services, each with its own access control policies, that must interoperate whi...
Jeffrey Fischer, Rupak Majumdar
ICRA
2009
IEEE
125views Robotics» more  ICRA 2009»
15 years 5 months ago
A novel method for learning policies from constrained motion
— Many everyday human skills can be framed in terms of performing some task subject to constraints imposed by the environment. Constraints are usually unobservable and frequently...
Matthew Howard, Stefan Klanke, Michael Gienger, Ch...