Sciweavers

116 search results - page 12 / 24
» Role-Based Access Control Requirements Model with Purpose Ex...
Sort
View
83
Voted
WETICE
1998
IEEE
15 years 1 months ago
Authorization and Attribute Certificates for Widely Distributed Access Control
We describe a system whose purpose is to explore the use of certificates for the distributed management of access rights for resources that have multiple, independent, and geograp...
William E. Johnston, Srilekha Mudumbai, Mary R. Th...
ECHT
1992
15 years 1 months ago
Hyperform: Using Extensibility to Develop Dynamic, Open and Distributed Hypertext Systems
An approach to exible hyperbase hypertext database support predicated on the notion of extensibility is presented. The extensible hypertext platform Hyperform implements basic hyp...
Uffe Kock Wiil, John J. Leggett
EMSOFT
2008
Springer
14 years 11 months ago
Wireless channel access reservation for embedded real-time systems
Reservation-based channel access has been shown to be effective in providing Quality of Service (QoS) guarantees (e.g., timeliness) in wireless embedded real-time applications suc...
Dinesh Rajan, Christian Poellabauer, Xiaobo Sharon...
HICSS
2003
IEEE
139views Biometrics» more  HICSS 2003»
15 years 2 months ago
Modeling of information dominance in complex systems: A system partitioning and hybrid control framework
This paper1 provides a view of modeling the information dominance problem of military systems as representative of modeling other complex systems. The ideas are an extension of ea...
John R. James
ICSE
2007
IEEE-ACM
15 years 9 months ago
When Role Models Have Flaws: Static Validation of Enterprise Security Policies
Modern multiuser software systems have adopted RoleBased Access Control (RBAC) for authorization management. This paper presents a formal model for RBAC policy validation and a st...
Marco Pistoia, Stephen J. Fink, Robert J. Flynn, E...