Sciweavers

670 search results - page 20 / 134
» A RBAC-Based Policy Information Base
Sort
View
IM
2007
13 years 11 months ago
CLID: A general approach to validate security policies in a dynamic network
- Many researchers have considered security policy management, including how to configure policies manually and even how to automatically generate security policies based on securi...
Yanyan Yang, Charles U. Martel, Shyhtsun Felix Wu
ICICS
2010
Springer
13 years 8 months ago
Fine-Grained Disclosure of Access Policies
Abstract. In open scenarios, where servers may receive requests to access their services from possibly unknown clients, access control is typically based on the evaluation of (cert...
Claudio Agostino Ardagna, Sabrina De Capitani di V...
JCS
2008
119views more  JCS 2008»
13 years 10 months ago
Synthesising verified access control systems through model checking
We present a framework for evaluating and generating access control policies. The framework contains a modelling formalism called RW, which is supported by a model checking tool. ...
Nan Zhang 0003, Mark Ryan, Dimitar P. Guelev
CAI
2000
Springer
13 years 9 months ago
Schema Evolution in Software Engineering Databases - a New Approach in Adele Environment
Abstract. This paper discusses schema evolution in software engineering databases. After a study of existing approaches, we show that these approaches do not satisfy software engin...
Mohamed Ahmed-Nacer, Jacky Estublier
ESORICS
2000
Springer
14 years 1 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud