Sciweavers

1140 search results - page 74 / 228
» A Purpose-Based Access Control Model
Sort
View
SP
2007
IEEE
113views Security Privacy» more  SP 2007»
14 years 2 months ago
Usable Mandatory Integrity Protection for Operating Systems
Existing mandatory access control systems for operating systems are difficult to use. We identify several principles for designing usable access control systems and introduce the...
Ninghui Li, Ziqing Mao, Hong Chen
MMB
2001
Springer
141views Communications» more  MMB 2001»
14 years 17 days ago
Performance Analysis of the Random Access Protocol in TETRAPOL Trunked Radio Networks
This paper provides a performance evaluation of the TETRAPOL random access protocol. The results are based on a Markovian model which is also presented. The Markovian model is use...
Dirk Kuypers, Peter Sievering
CAI
2006
Springer
13 years 8 months ago
Formal Verification of Security Model Using SPR Tool
In this paper, formal verification methodologies and the SPR (Safety Problem Resolver) model checking tool are used for verifying a security model's safety. The SPR tool makes...
Il-Gon Kim, Miyoung Kang, Jin-Young Choi, Peter D....
SACMAT
2006
ACM
14 years 2 months ago
Fine-grained role-based delegation in presence of the hybrid role hierarchy
Delegation of authority is an important process that needs to be captured by any access control model. In role-based access control models, delegation of authority involves delega...
James B. D. Joshi, Elisa Bertino
CSCWD
2008
Springer
13 years 10 months ago
Authorization approaches for advanced permission-role assignments
Role-based access control (RBAC) has been proven to be a flexible and useful access control model for information sharing in distributed collaborative environments. Permission-rol...
Hua Wang, Jianming Yong, Jiuyong Li, Min Peng