Sciweavers

635 search results - page 12 / 127
» A Context-Sensitive Access Control Model and Prototype Imple...
Sort
View
IPCCC
2007
IEEE
14 years 1 months ago
Applications of the Oriented Permission Role-Based Access Control Model
Role-based access control and role hierarchies have been the subject of considerable research in recent years. In this paper, we consider three useful applications of a new role-b...
Liang Chen, Jason Crampton
WWW
2007
ACM
14 years 8 months ago
A fault model and mutation testing of access control policies
To increase confidence in the correctness of specified policies, policy developers can conduct policy testing by supplying typical test inputs (requests) and subsequently checking...
Evan Martin, Tao Xie
DBSEC
2011
233views Database» more  DBSEC 2011»
12 years 11 months ago
Multiparty Authorization Framework for Data Sharing in Online Social Networks
Online social networks (OSNs) have experienced tremendous growth in recent years and become a de facto portal for hundreds of millions of Internet users. These OSNs offer attractiv...
Hongxin Hu, Gail-Joon Ahn
ANSS
2001
IEEE
13 years 11 months ago
Simulation-Based Engineering of Complex Adaptive Systems Using a Classifier Block
A Complex Adaptive System (CAS) is a network of communicating, intelligent agents where each agent adapts its behavior in order to collaborate with other agents to achieve overall...
John R. Clymer, David J. Chen
ICS
2005
Tsinghua U.
14 years 1 months ago
Lightweight reference affinity analysis
Previous studies have shown that array regrouping and structure splitting significantly improve data locality. The most effective technique relies on profiling every access to eve...
Xipeng Shen, Yaoqing Gao, Chen Ding, Roch Archamba...