Sciweavers

635 search results - page 36 / 127
» A Context-Sensitive Access Control Model and Prototype Imple...
Sort
View
ACSAC
2009
IEEE
14 years 2 months ago
How to Securely Break into RBAC: The BTG-RBAC Model
—Access control models describe frameworks that dictate how subjects (e.g. users) access resources. In the Role-Based Access Control (RBAC) model access to resources is based on ...
Ana Ferreira, David W. Chadwick, Pedro Farinha, Ri...
APSEC
2005
IEEE
14 years 1 months ago
Microcomponent-Based Component Controllers: A Foundation for Component Aspects
In most component models, a software component consists of a functional part and a controller part. The controller part may be extensible; however, existing component models provi...
Vladimir Mencl, Tomás Bures
EGOV
2005
Springer
14 years 1 months ago
Personalized Access to Multi-version Norm Texts in an eGovernment Scenario
In this paper, we present some results of an ongoing research involving the design and implementation, in an eGovernment scenario, of a multi-version repository of norm texts suppo...
Fabio Grandi, Federica Mandreoli, Riccardo Martogl...
SUTC
2006
IEEE
14 years 1 months ago
Design and Implementation of Ubiquitous Smart Cameras
Design aspects and software modelling for ubiquitous real-time camera system are described in this paper. We propose system architecture using a network of inexpensive cameras and...
Chang Hong Lin, Wayne Wolf, Andrew Dixon, Xenofon ...
ESORICS
2007
Springer
14 years 1 months ago
Maintaining High Performance Communication Under Least Privilege Using Dynamic Perimeter Control
Abstract. From a security standpoint, it is preferable to implement least privilege network security policies in which only the bare minimum of TCP/UDP ports on internal hosts are ...
Paul Z. Kolano