Sciweavers

670 search results - page 26 / 134
» A RBAC-Based Policy Information Base
Sort
View
IJNSEC
2007
142views more  IJNSEC 2007»
13 years 11 months ago
Java Bytecode Dependence Analysis for Secure Information Flow
Java programs can be transmitted and executed on another host in bytecode format, thus the sensitive information of the host may be leaked via these assembly-like programs. Inform...
Gaowei Bian, Ken Nakayama, Yoshitake Kobayashi, Ma...
DAGSTUHL
2003
14 years 16 days ago
Policies: Giving Users Control over Calls
Abstract. Features provide extensions to a basic service, but in new systems users require much greater flexibility oriented towards their needs. Traditional features do not easil...
Stephan Reiff-Marganiec
INFOCOM
2010
IEEE
13 years 9 months ago
Delay-Based Network Utility Maximization
—It is well known that max-weight policies based on a queue backlog index can be used to stabilize stochastic networks, and that similar stability results hold if a delay index i...
Michael J. Neely
IJISEC
2007
149views more  IJISEC 2007»
13 years 11 months ago
Dynamic security labels and static information flow control
This paper presents a language in which information flow is securely controlled by a type system, yet the security class of data can vary dynamically. Information flow policies ...
Lantian Zheng, Andrew C. Myers
FLAIRS
2003
14 years 16 days ago
A Possibilistic Logic Encoding of Access Control
This paper proposes a modelling of information security policies in the framework of possibilistic logic. Our modelling is based on the concept of roles associated with users. Acc...
Salem Benferhat, Rania El Baida, Fréd&eacut...