Sciweavers

857 search results - page 24 / 172
» A Formal Framework for Adaptive Access Control Models
Sort
View
ENTCS
2007
128views more  ENTCS 2007»
13 years 7 months ago
Rewriting-Based Access Control Policies
In this paper we propose a formalization of access control policies based on term rewriting. The state of the system to which policies are enforced is represented as an algebraic ...
Anderson Santana de Oliveira
IJNSEC
2006
112views more  IJNSEC 2006»
13 years 7 months ago
An Access Control System with Time-constraint Using Support Vector Machines
Access control is an important issue in information security. It is a necessary mechanism for protecting data in a computer system. In this paper, we apply support vector machines...
Chin-Chen Chang, Iuon-Chang Lin, Chia-Te Liao
ICDE
2007
IEEE
223views Database» more  ICDE 2007»
14 years 1 months ago
Privacy Access Control Model with Location Constraints for XML Services
Information privacy is usually concerned with the confidentiality of personal identifiable information (PII), such as electronic medical records. Nowadays XML services are used to...
Yi Zheng, Yongming Chen, Patrick C. K. Hung
COLCOM
2008
IEEE
13 years 9 months ago
RiBAC: Role Interaction Based Access Control Model for Community Computing
Community computing is an agent-based development paradigm for ubiquitous computing systems. In a community computing system, ubiquitous services are provided by cooperation among ...
Youna Jung, Amirreza Masoumzadeh, James B. D. Josh...
JHSN
2006
267views more  JHSN 2006»
13 years 7 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...