Sciweavers

366 search results - page 3 / 74
» Access Policy Design Supported by FCA Methods
Sort
View
FCA
2005
Springer
188views Formal Methods» more  FCA 2005»
14 years 10 days ago
Formal Concept Analysis-Based Class Hierarchy Design in Object-Oriented Software Development
The class hierarchy is an important aspect of object-oriented software development. Design and maintenance of such a hierarchy is a difficult task that is often accomplished witho...
Robert Godin, Petko Valtchev
GRID
2007
Springer
13 years 6 months ago
Managing Role-Based Access Control Policies for Grid Databases in OGSA-DAI Using CAS
In this paper, we present a role-based access control method for accessing databases through the Open Grid Services Architecture – Data Access and Integration (OGSA-DAI) framewor...
Anil L. Pereira, Vineela Muppavarapu, Soon M. Chun...
IFIP
2010
Springer
13 years 1 months ago
Cryptographic Enforcement of Role-Based Access Control
Many cryptographic schemes have been designed to enforce information flow policies. However, enterprise security requirements are often better encoded, or can only be encoded, usin...
Jason Crampton
CORR
2010
Springer
74views Education» more  CORR 2010»
13 years 7 months ago
RAFDA: Middleware Supporting the Separation of Application Logic from Distribution Policy
Middleware technologies, often limit the way in which object classes may be used in distributed applications due to the fixed distribution policies imposed by the Middleware system...
Alan Dearle, Scott M. Walker, Stuart J. Norcross, ...
CORR
2010
Springer
133views Education» more  CORR 2010»
13 years 7 months ago
Access-Network Association Policies for Media Streaming in Heterogeneous Environments
Abstract--We study the design of media streaming applications in the presence of multiple heterogeneous wireless access methods with different throughputs and costs. Our objective ...
Ali ParandehGheibi, Muriel Médard, Asuman E...