Sciweavers

1140 search results - page 108 / 228
» A Purpose-Based Access Control Model
Sort
View
CAISE
2004
Springer
14 years 1 months ago
Secure Databases: An Analysis of Clark-Wilson Model in a Database Environment
Abstract. Information systems are vulnerable to accidental or malicious attacks. Security models for commercial computer systems exist, but information systems security is often ig...
Xiaocheng Ge, Fiona Polack, Régine Laleau
ANSS
2006
IEEE
14 years 2 months ago
Performance Modeling and Evaluation of E-Business Systems
A general model of an E-business system comprising an Application Server and a Database engine is analyzed and evaluated. Incoming jobs, once admitted for processing, compete for ...
Giovanna Ferrari, Paul D. Ezhilchelvan, Isi Mitran...
BPSC
2010
139views Business» more  BPSC 2010»
13 years 6 months ago
Static Information Flow Analysis of Workflow Models
: This paper proposes a framework for the detection of information leaks in workflow descriptions based on static information flow analysis. Despite the correct deployment of acces...
Rafael Accorsi, Claus Wonnemann
ICDE
2007
IEEE
134views Database» more  ICDE 2007»
14 years 2 months ago
Apply Model Checking to Security Analysis in Trust Management
Trust management is a form of access control that uses delegation to achieve scalability beyond a single organization or federation. However, delegation can be difficult to contr...
Mark Reith, Jianwei Niu, William H. Winsborough
CDC
2009
IEEE
132views Control Systems» more  CDC 2009»
14 years 23 days ago
A mechanism design approach to the stabilization of networked dynamical systems
— In this paper we study the problem of stabilizing a networked control system (NCS) composed of N linear dynamical subplants and an equal number of controllers acting over a sha...
Luca Galbusera, Nicola Gatti, Carlo Romani