Sciweavers

481 search results - page 33 / 97
» Analyzing and Managing Role-Based Access Control Policies
Sort
View
HOTOS
1999
IEEE
14 years 1 months ago
Flexible Access Control using IPC Redirection
We present a mechanism for inter-process communication (IPC) redirection that enables efficient and flexible access control for micro-kernel systems. In such systems, services are...
Trent Jaeger, Kevin Elphinstone, Jochen Liedtke, V...
SACMAT
2009
ACM
14 years 3 months ago
Analysis of virtual machine system policies
The recent emergence of mandatory access (MAC) enforcement for virtual machine monitors (VMMs) presents an opportunity to enforce a security goal over all its virtual machines (VM...
Sandra Rueda, Hayawardh Vijayakumar, Trent Jaeger
CCS
2007
ACM
14 years 24 days ago
Efficient techniques for realizing geo-spatial access control
The problem of key management for access control systems has been well-studied, and the literature contains several schemes for hierarchy-based and temporal-based access control. ...
Mikhail J. Atallah, Marina Blanton, Keith B. Frikk...
CHI
2008
ACM
14 years 9 months ago
A user study of policy creation in a flexible access-control system
Significant effort has been invested in developing expressive and flexible access-control languages and systems. However, little has been done to evaluate these systems in practic...
Lujo Bauer, Lorrie Faith Cranor, Robert W. Reeder,...
JSA
2010
101views more  JSA 2010»
13 years 7 months ago
Experimental evaluation of slack management in real-time control systems: Coordinated vs. self-triggered approach
Effective slack management, i.e. management of unused computing resources, for real-time control tasks mandates to redistribute the available resources between controllers as a f...
Manel Velasco, Pau Martí, Josep M. Fuertes,...