Sciweavers

1140 search results - page 79 / 228
» A Purpose-Based Access Control Model
Sort
View
TIME
2005
IEEE
14 years 1 months ago
A Trace Semantics for Positive Core XPath
— We provide a novel trace semantics for positive core XPath that exposes all intermediate nodes visited by the query engine. This enables a detailed analysis of all information ...
Pieter H. Hartel
ICTAC
2005
Springer
14 years 1 months ago
Representation and Reasoning on RBAC: A Description Logic Approach
Abstract. Role-based access control (RBAC) is recognized as an excellent model for access control in large-scale networked applications. Formalization of RBAC in a logical approach...
Chen Zhao, NuerMaimaiti Heilili, Shengping Liu, Zu...

Publication
342views
14 years 10 months ago
Understanding the relationships between regional accessibility travel behaviour and home value
Accessibility is a comprehensive measure of the interaction between land use and transportation systems. It has been put forward as a performance-measure for evaluating the land u...
Cerda, A. and El-Geneidy, A.
PERCOM
2007
ACM
14 years 7 months ago
Dual Ownership: Access Management for Shared Item Information in RFID-enabled Supply Chains
RFID tags combined with globally unique numbering schemes such as the Electronic Product Code (EPC) help standardizing the communication along the supply chain. Participants gener...
Alexander Ilic, Florian Michahelles, Elgar Fleisch
CSFW
1994
IEEE
14 years 7 days ago
One-Representative Safety Analysis in the Non-Monotonic Transform Model
We analyze the safety question for the Non-Monotonic Transform NMT model, an access control model that encompasses a wide variety of practical access control mechanisms. In genera...
Ravi S. Sandhu, Paul Ammann