Sciweavers

596 search results - page 37 / 120
» Theories of Access Consciousness
Sort
View
64
Voted
SACMAT
2003
ACM
15 years 4 months ago
Dependencies and separation of duty constraints in GTRBAC
A Generalized Temporal Role Based Access Control (GTRBAC) model that captures an exhaustive set of temporal constraint needs for access control has recently been proposed. GTRBACā...
James Joshi, Basit Shafiq, Arif Ghafoor, Elisa Ber...
TLDI
2010
ACM
190views Formal Methods» more  TLDI 2010»
15 years 7 months ago
Distributed programming with distributed authorization
We propose a programming language, called PCML5, for building distributed applications with distributed access control. Target applications include web-based systems in which prog...
Kumar Avijit, Anupam Datta, Robert Harper
WWW
2003
ACM
15 years 11 months ago
Automatic Summarization for Financial News Delivery on Mobile Devices
Wireless access with mobile devices is a promising addition to the WWW and traditional electronic business. Mobile devices provide convenience and portable access to the huge info...
Christopher C. Yang, Fu Lee Wang
CADE
2011
Springer
13 years 11 months ago
ASASP: Automated Symbolic Analysis of Security Policies
We describe asasp, a symbolic reachability procedure for the analysis of administrative access control policies. The tool represents access policies and their administrative action...
Francesco Alberti, Alessandro Armando, Silvio Rani...
MOC
2010
14 years 5 months ago
On the numerical evaluation of Fredholm determinants
Some significant quantities in mathematics and physics are most naturally expressed as the Fredholm determinant of an integral operator, most notably many of the distribution funct...
Folkmar Bornemann