Sciweavers

1167 search results - page 82 / 234
» policy 2007
Sort
View
BPSC
2009
190views Business» more  BPSC 2009»
15 years 1 months ago
Detective Information Flow Analysis for Business Processes
Abstract: We report on ongoing work towards a posteriori detection of illegal information flows for business processes, focusing on the challenges involved in doing so. Resembling ...
Rafael Accorsi, Claus Wonnemann
COLCOM
2007
IEEE
15 years 6 months ago
Secure peer-to-peer networks for trusted collaboration
Abstract—An overview of recent advances in secure peerto-peer networking is presented, toward enforcing data integrity, confidentiality, availability, and access control policie...
Kevin W. Hamlen, Bhavani M. Thuraisingham
IEEEIAS
2007
IEEE
15 years 6 months ago
SARBAC07: A Scoped Administration Model for RBAC with Hybrid Hierarchy
Recently, administration of RBAC systems using a role-based approach has become very appealing because of the benefits that such an approach typically brings. This approach uses R...
Yue Zhang 0002, James B. D. Joshi
SDMW
2007
Springer
15 years 6 months ago
Query Rewriting Algorithm Evaluation for XML Security Views
Abstract. We investigate the experimental effectiveness of query rewriting over XML security views. Our model consists of access control policies specified over DTDs with XPath e...
Nataliya Rassadko
AINA
2007
IEEE
15 years 6 months ago
A Flexible Scheduling Framework for Deeply Embedded Systems
— Typical embedded systems must perform rather complex control and communication tasks with severely restricted computing resources. Due to these contraints most systems are sing...
Karsten Walther, Jörg Nolte