Sciweavers

868 search results - page 28 / 174
» Resiliency policies in access control
Sort
View
SAMOS
2009
Springer
15 years 6 months ago
Prediction in Dynamic SDRAM Controller Policies
Abstract. Memory access latency can limit microcontroller system performance. SDRAM access control policies impact latency through SDRAM device state. It is shown that execution ti...
Ying Xu, Aabhas S. Agarwal, Brian T. Davis
EDBT
2008
ACM
137views Database» more  EDBT 2008»
15 years 12 months ago
ACCOn: checking consistency of XML write-access control policies
XML access control policies involving updates may contain security flaws, here called inconsistencies, in which a forbidden operation may be simulated by performing a sequence of ...
Loreto Bravo, James Cheney, Irini Fundulaki
DBSEC
2008
107views Database» more  DBSEC 2008»
15 years 1 months ago
Regulating Exceptions in Healthcare Using Policy Spaces
One truth holds for the healthcare industry - nothing should interfere with the delivery of care. Given this fact, the access control mechanisms used in healthcare to regulate and ...
Claudio Agostino Ardagna, Sabrina De Capitani di V...
ISW
2009
Springer
15 years 6 months ago
Hardware-Assisted Application-Level Access Control
Abstract. Applications typically rely on the operating system to enforce access control policies such as MAC, DAC, or other policies. However, in the face of a compromised operatin...
Yu-Yuan Chen, Ruby B. Lee
DSS
2007
124views more  DSS 2007»
14 years 11 months ago
Access control in collaborative commerce
Corporate collaboration allows organizations to improve the efficiency and quality of their business activities. It may occur as a workflow collaboration, a supply chain collabora...
Eldon Y. Li, Timon C. Du, Jacqueline W. Wong