Sciweavers

3899 search results - page 16 / 780
» Argumentation for Access Control
Sort
View
WETICE
2003
IEEE
14 years 3 months ago
Policy Storage for Role-Based Access Control Systems
Role-based access control has been a focal area for many security researchers over the last decade. There have been a large number of models, and many rich specification language...
András Belokosztolszki, David M. Eyers, Wei...
ISCAPDCS
2004
13 years 11 months ago
A Framework for Role-Based Access Control in Group Communication Systems
In this paper we analyze the requirements access control mechanisms must fulfill in the context of group communication and define a framework for supporting fine-grained access co...
Cristina Nita-Rotaru, Ninghui Li
CDC
2010
IEEE
101views Control Systems» more  CDC 2010»
13 years 5 months ago
Maintaining connectivity among multiple agents in cyclic pursuit: A geometric approach
This paper studies the connectivity maintenance problem in linear and nonlinear cyclic pursuit, when different control gains are assigned to each agent. Feasibility/infeasibility c...
Fabio Morbidi, Antonio Giannitrapani, Domenico Pra...
SACMAT
2003
ACM
14 years 3 months ago
Dynamic access control: preserving safety and trust for network defense operations
We investigate the cost of changing access control policies dynamically as a response action in computer network defense. We compare and contrast the use of access lists and capab...
Prasad Naldurg, Roy H. Campbell
SEC
2000
13 years 11 months ago
A Context-Sensitive Access Control Model and Prototype Implementation
: Role-based access control associates roles with privileges and users with roles. Changes to these associations are infrequent and explicit. This may not reflect business requirem...
Damian G. Cholewka, Reinhardt A. Botha, Jan H. P. ...