Sciweavers

103 search results - page 13 / 21
» Towards a location-based mandatory access control model
Sort
View
SACMAT
2009
ACM
15 years 6 months ago
Towards formal security analysis of GTRBAC using timed automata
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri
DBSEC
2004
170views Database» more  DBSEC 2004»
15 years 1 months ago
RBAC/MAC Security Analysis and Design for UML
In software construction, analysis investigates the boundary of a system (scope and requirements), its usage and access, and from a security perspective, who needs access to what ...
Thuong Doan, Steven A. Demurjian, Charles E. Phill...
GIS
2008
ACM
15 years 23 days ago
Towards a scalable model for location privacy
With the growth of wireless and mobile technologies, we are witnessing an increase in location-based services (LBS). Although LBS provide enhanced functionalities, they open up ne...
Nayot Poolsappasit, Indrakshi Ray
ATAL
2005
Springer
15 years 5 months ago
An organisation infrastructure for Multi-Agent Systems based on Agent Coordination Contexts
We present an organisation infrastructure for open MultiAgent Systems built upon a role-based access control model (RBAC), which provides agents with means to enable and control a...
Mirko Viroli, Alessandro Ricci, Andrea Omicini
USS
2008
15 years 2 months ago
Verifying Compliance of Trusted Programs
In this paper, we present an approach for verifying that trusted programs correctly enforce system security goals when deployed. A trusted program is trusted to only perform safe ...
Sandra Rueda, Dave King 0002, Trent Jaeger