Sciweavers

362 search results - page 25 / 73
» An access control model for simplifying constraint expressio...
Sort
View
JCS
2008
69views more  JCS 2008»
13 years 7 months ago
Non-delegatable authorities in capability systems
We present a novel technique, known as the non-delegatable authority (NDA), for distributing authority to unconfined subjects in capability systems that prevents them from sharing...
Toby C. Murray, Duncan A. Grove
ACSAC
2001
IEEE
13 years 11 months ago
Detecting Conflicts in a Role-Based Delegation Model
The RBAC96 access control model has been the basis for extensive work on role-based constraint specification and role-based delegation. However, these practical extensions can als...
Andreas Schaad
ESORICS
1994
Springer
13 years 11 months ago
On the Expressive Power of the Unary Transformation Model
The Transformation Model TRM was recently introduced 10 in the literature by Sandhu and Ganta. TRM is based on the concept of transformation of rights. The propagation of access ri...
Ravi S. Sandhu, Srinivas Ganta
CDC
2008
IEEE
170views Control Systems» more  CDC 2008»
14 years 2 months ago
Modeling and control of the protein synthesis process in eukaryotic cells
— Protein synthesis is an essential process of cell cycle and growth in eukaryotic cells. The initiation stage of the translation process is known to be the most crucial in regul...
Nadav S. Bar, Rahmi Lale
SACMAT
2009
ACM
14 years 2 months ago
Symbolic reachability analysis for parameterized administrative role based access control
Role based access control (RBAC) is a widely used access control paradigm. In large organizations, the RBAC policy is managed by multiple administrators. An administrative role ba...
Scott D. Stoller, Ping Yang, Mikhail I. Gofman, C....