Sciweavers

366 search results - page 2 / 74
» Access Policy Design Supported by FCA Methods
Sort
View
FTDCS
2004
IEEE
13 years 10 months ago
Towards Supporting Fine-Grained Access Control for Grid Resources
The heterogeneous nature and independent administration of geographically dispersed resources in Grid, demand the need for access control using fine-grained policies. In this pape...
Elisa Bertino, Pietro Mazzoleni, Bruno Crispo, Swa...
SP
2002
IEEE
103views Security Privacy» more  SP 2002»
13 years 6 months ago
Methods and Limitations of Security Policy Reconciliation
A security policy specifies session participant requirements. However, existing frameworks provide limited facilities for the automated reconciliation of participant policies. Thi...
Patrick Drew McDaniel, Atul Prakash
ICSNC
2007
IEEE
14 years 1 months ago
Automated QoS policy adaptation for heterogeneous access network environments
To support QoS guarantee and resource usage in heterogeneous access network environments more efficiently (UMTS, WIMAX, WLAN DVB-T, DVB-H), there is the challenge of automated con...
Pedro A. Aranda-Gutiérrez, Ilka Miloucheva
ICC
2008
IEEE
126views Communications» more  ICC 2008»
14 years 1 months ago
Multiple Backhaul Mobile Access Router: Design and Experimentation
—The Multiple Backhaul Mobile Access Router aims to provide high capacity and high performance Internet access for emerging mobile wireless applications. In this paper we describ...
Yan Sun, Fangfei Chen, Thomas F. La Porta
FASE
2004
Springer
14 years 6 days ago
Modeling Role-Based Access Control Using Parameterized UML Models
Abstract. Organizations use Role-Based Access Control (RBAC) to protect computer-based resources from unauthorized access. There has been considerable work on formally specifying R...
Dae-Kyoo Kim, Indrakshi Ray, Robert B. France, Na ...