Sciweavers

177 search results - page 6 / 36
» Access Control Based on Execution History
Sort
View
TON
2010
157views more  TON 2010»
13 years 2 months ago
Random Access Game and Medium Access Control Design
We study the contention/interaction among wireless nodes and med -ium access control design in game theory framework. We define a general class of games, called random access game...
Lijun Chen, Steven H. Low, John C. Doyle
IWFM
2000
167views Formal Methods» more  IWFM 2000»
13 years 8 months ago
An Algebraic Basis for Specifying and Enforcing Access Control in Security Systems
Security services in a multi-user environment are often based on access control mechanisms. Static of an access control policy can be formalised using abstract algebraic models. W...
Claus Pahl
EMSOFT
2006
Springer
13 years 11 months ago
Modeling a system controller for timing analysis
Upper bounds on worst-case execution times, which are commonly called WCET, are a prerequisite for validating the temporal correctness of tasks in a real-time system. Due to the e...
Stephan Thesing
CSE
2009
IEEE
14 years 2 months ago
HACK: A Health-Based Access Control Mechanism for Dynamic Enterprise Environments
—Current access control schemes focus on the user and their rights and privileges relating to the access to both initiating functionality and accessing information. This approach...
Chenjia Wang, Kevin P. Monaghan, Weisong Shi
COLCOM
2008
IEEE
13 years 9 months ago
RiBAC: Role Interaction Based Access Control Model for Community Computing
Community computing is an agent-based development paradigm for ubiquitous computing systems. In a community computing system, ubiquitous services are provided by cooperation among ...
Youna Jung, Amirreza Masoumzadeh, James B. D. Josh...