Sciweavers

534 search results - page 9 / 107
» Aggregating and Deploying Network Access Control Policies
Sort
View
ISICT
2003
13 years 8 months ago
Intelligent access and mobility management in heterogeneous wireless networks using policy
The next generation of mobile networks will utilise multiple radio access technologies. These heterogeneous wireless networks will enable the user to seamlessly roam between the d...
Ken Murray, Rajiv Mathur, Dirk Pesch
ETFA
2006
IEEE
13 years 11 months ago
Component based deployment of industrial control systems: a hybrid scheduling approach
This paper deals with the IEC 61499 standard. A function block (FB) is an event triggered component and an application is a distributed FBs network on several devices. We consider...
Mohamed Khalgui, Xavier Rebeuf, Françoise S...
IJNSEC
2010
145views more  IJNSEC 2010»
13 years 2 months ago
Formal Specification of Common Criteria Based Access Control Policy Model
One of the major threats that an enterprise Information system networks are facing today is the Insider threat. As part of the Insider Threat study, lack of an effective access co...
Manpreet Singh, Manjeet S. Patterh
SACMAT
2005
ACM
14 years 27 days ago
Composing and combining policies under the policy machine
As a major component of any host, or network operating system, access control mechanisms come in a wide variety of forms, each with their individual attributes, functions, methods...
David F. Ferraiolo, Serban I. Gavrila, Vincent C. ...
JCS
2008
88views more  JCS 2008»
13 years 7 months ago
A privacy-aware access control system
The protection of privacy is an increasing concern in our networked society because of the growing amount of personal information that is being collected by a number of commercial...
Claudio Agostino Ardagna, Marco Cremonini, Sabrina...