Sciweavers

872 search results - page 14 / 175
» An Access Control Language for a General Provenance Model
Sort
View
DEXAW
2003
IEEE
99views Database» more  DEXAW 2003»
14 years 24 days ago
A Model for Context-dependent Access Control for Web-based Services with Role-based Approach
Controlling access to resources is one of the most important protection goals for web-based services in practice. In general, access control requires identification of subjects t...
Ruben Wolf, Thomas Keinz, Markus Schneider
JHSN
2006
267views more  JHSN 2006»
13 years 7 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...
IJNSEC
2010
145views more  IJNSEC 2010»
13 years 2 months ago
Formal Specification of Common Criteria Based Access Control Policy Model
One of the major threats that an enterprise Information system networks are facing today is the Insider threat. As part of the Insider Threat study, lack of an effective access co...
Manpreet Singh, Manjeet S. Patterh
RSEISP
2007
Springer
14 years 1 months ago
Generalizing Data in Natural Language
This paper concerns the development of a new direction in machine learning, called natural induction, which requires from computergenerated knowledge not only to have high predicti...
Ryszard S. Michalski, Janusz Wojtusiak
WETICE
2003
IEEE
14 years 23 days ago
Policy Storage for Role-Based Access Control Systems
Role-based access control has been a focal area for many security researchers over the last decade. There have been a large number of models, and many rich specification language...
András Belokosztolszki, David M. Eyers, Wei...