Sciweavers

926 search results - page 9 / 186
» Policy framings for access control
Sort
View
CHI
2011
ACM
14 years 1 months ago
Exploring reactive access control
As users store and share more digital content at home, access control becomes increasingly important. One promising approach for helping non-expert users create accurate access po...
Michelle L. Mazurek, Peter F. Klemperer, Richard S...
DASC
2006
IEEE
15 years 1 months ago
Runtime Security Verification for Itinerary-Driven Mobile Agents
We present a new approach to ensure the secure execution of itinerary-driven mobile agents, in which the specification of the navigational behavior of an agent is separated from t...
Zijiang Yang, Shiyong Lu, Ping Yang
FOSAD
2000
Springer
15 years 1 months ago
Access Control: Policies, Models, and Mechanisms
Access control is the process of mediating every request to resources and data maintained by a system and determining whether the request should be granted or denied. The access co...
Pierangela Samarati, Sabrina De Capitani di Vimerc...
FASE
2004
Springer
15 years 3 months ago
Modeling Role-Based Access Control Using Parameterized UML Models
Abstract. Organizations use Role-Based Access Control (RBAC) to protect computer-based resources from unauthorized access. There has been considerable work on formally specifying R...
Dae-Kyoo Kim, Indrakshi Ray, Robert B. France, Na ...
WORDS
2005
IEEE
15 years 3 months ago
A Role-Based Access Control Policy Verification Framework for Real-Time Systems
This paper presents a framework for verifying the access control requirements of real-time application systems such as workflow management systems and active databases. The tempor...
Basit Shafiq, Ammar Masood, James Joshi, Arif Ghaf...