Sciweavers

3899 search results - page 14 / 780
» Argumentation for Access Control
Sort
View
SACMAT
2010
ACM
14 years 2 months ago
Towards analyzing complex operating system access control configurations
Hong Chen, Ninghui Li, Christopher S. Gates, Ziqin...
EDCC
2010
Springer
14 years 2 months ago
Software Process Synthesis in Assurance Based Development of Dependable Systems
—Assurance Based Development (ABD) is a novel approach to the synergistic construction of critical software systems and their assurance arguments. In ABD, the need for assurance ...
Patrick J. Graydon, John C. Knight
RTSS
2002
IEEE
14 years 2 months ago
An Implicit Prioritized Access Protocol for Wireless Sensor Networks
Marco Caccamo, Lynn Y. Zhang, Lui Sha, Giorgio C. ...
SUTC
2006
IEEE
14 years 4 months ago
The Computational Complexity of Enforceability Validation for Generic Access Control Rules
In computer security, many researches have tackled on the possibility of a unified model of access control, which could enforce any access control policies within a single unified...
Vincent C. Hu, D. Richard Kuhn, David F. Ferraiolo
DBSEC
2006
122views Database» more  DBSEC 2006»
13 years 11 months ago
Term Rewriting for Access Control
We demonstrate how access control models and policies can be represented by using term rewriting systems, and how rewriting may be used for evaluating access requests and for provi...
Steve Barker, Maribel Fernández