Sciweavers

366 search results - page 16 / 74
» Access Policy Design Supported by FCA Methods
Sort
View
LREC
2008
120views Education» more  LREC 2008»
13 years 9 months ago
The U.S. Policy Agenda Legislation Corpus Volume 1 - a Language Resource from 1947 - 1998
We introduce the corpus of United States Congressional bills from 1947 to 1998 for use by language research communities. The U.S. Policy Agenda Legislation Corpus Volume 1 (USPALC...
Stephen Purpura, John Wilkerson, Dustin Hillard
SACMAT
2010
ACM
13 years 6 months ago
Enforcing spatial constraints for mobile RBAC systems
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the administrative and security advantages of RBAC with the dynamic nature of mobile and...
Michael S. Kirkpatrick, Elisa Bertino
ERCIMDL
2007
Springer
84views Education» more  ERCIMDL 2007»
14 years 1 months ago
VIRGIL - Providing Institutional Access to a Repository of Access Grid Sessions
This paper describes the VIRGIL (Virtual Meeting Archival) system which was developed to provide a simple, practical, easy-to-use method for recording, indexing and archiving large...
Ron Chernich, Jane Hunter, Alex Davies
ESORICS
2008
Springer
13 years 9 months ago
On the Security of Delegation in Access Control Systems
Delegation is a mechanism that allows a user A to act on another user B's behalf by making B's access rights available to A. It is well recognized as an important mechani...
Qihua Wang, Ninghui Li, Hong Chen
IWMM
2007
Springer
110views Hardware» more  IWMM 2007»
14 years 1 months ago
Path: page access tracking to improve memory management
Traditionally, operating systems use a coarse approximation of memory accesses to implement memory management algorithms by monitoring page faults or scanning page table entries. ...
Reza Azimi, Livio Soares, Michael Stumm, Thomas Wa...