Sciweavers

211 search results - page 8 / 43
» A Compositional Multiple Policies Operating System Security ...
Sort
View
JCS
2010
124views more  JCS 2010»
13 years 6 months ago
Verifying resource access control on mobile interactive devices
A model of resource access control is presented in which the access control to resources can employ user interaction to obtain the necessary permissions. This model is inspired by...
Frédéric Besson, Guillaume Dufay, Th...
SMC
2010
IEEE
117views Control Systems» more  SMC 2010»
13 years 6 months ago
A simulation modelling approach enabling joint emergency response operations
—A novel capability for modelling and simulating intra- and inter-organizational collaboration in an emergencyresponse domain is presented. This capability combines the prescript...
Nicola Bicocchi, William Ross, Mihaela Ulieru
SACMAT
2009
ACM
14 years 2 months ago
Symbolic reachability analysis for parameterized administrative role based access control
Role based access control (RBAC) is a widely used access control paradigm. In large organizations, the RBAC policy is managed by multiple administrators. An administrative role ba...
Scott D. Stoller, Ping Yang, Mikhail I. Gofman, C....
CASSIS
2005
Springer
14 years 1 months ago
The Design of Application-Tailorable Operating System Product Lines
System software for deeply embedded devices has to cope with a broad variety of requirements and platforms, but especially with strict resource constraints. To compete against prop...
Daniel Lohmann, Wolfgang Schröder-Preikschat,...
EUROSYS
2008
ACM
14 years 4 months ago
Manageable fine-grained information flow
The continuing frequency and seriousness of security incidents underlines the importance of application security. Decentralized information flow control (DIFC), a promising tool ...
Petros Efstathopoulos, Eddie Kohler