Sciweavers

708 search results - page 82 / 142
» A Policy Based Framework for Access Control
Sort
View
AINA
2007
IEEE
15 years 8 months ago
Conflict Detection and Resolution in Context-Aware Authorization
Pervasive computing environments introduce new requirements in expressiveness and flexibility of access control policies which are almost addressable leveraging contextual informa...
Amir Reza Masoumzadeh, Morteza Amini, Rasool Jalil...
CCS
2006
ACM
15 years 8 months ago
Safety analysis of usage control authorization models
The usage control (UCON) model was introduced as a unified approach to capture a number of extensions for traditional access control models. While the policy specification flexibi...
Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Pre...
CDC
2008
IEEE
117views Control Systems» more  CDC 2008»
15 years 11 months ago
Event-based optimization for dispatching policies in material handling systems of general assembly lines
—A material handling (MH) system of a general assembly line dispatching parts from inventory to working buffers could be complicated and costly to operate. Generally it is extrem...
Yanjia Zhao, Qianchuan Zhao, Qing-Shan Jia, Xiaoho...
SERP
2010
15 years 2 months ago
Role Explosion: Acknowledging the Problem
- In large enterprises subject to constant employee turnover and challenging security policies, the administration of Role-based Access Control (RBAC) is a daunting task that is of...
Aaron Elliott, Scott Knight
CDC
2009
IEEE
113views Control Systems» more  CDC 2009»
15 years 8 months ago
A switched system approach to scheduling of networked control systems with communication constraints
This paper presents a scheduling strategy for a collection of discrete-time networked control systems (NCSs) subjected to communication constraints. Communication constraints under...
Shi-Lu Dai, Hai Lin, Shuzhi Sam Ge