Sciweavers

3899 search results - page 4 / 780
» Argumentation for Access Control
Sort
View
SP
1998
IEEE
106views Security Privacy» more  SP 1998»
13 years 12 months ago
Understanding Java Stack Inspection
Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
Dan S. Wallach, Edward W. Felten
EUC
2005
Springer
14 years 1 months ago
Access Policy Sheet for Access Control in Fine-Grained XML
Abstract. We propose an access control scheme for developing authorization rules for XML documents, allowing flexible data granularity and authorization propagation. To simplify t...
Jing Wu, Yi Mu, Jennifer Seberry, Chun Ruan
DBSEC
2007
131views Database» more  DBSEC 2007»
13 years 9 months ago
Dynamic Event-Based Access Control as Term Rewriting
Abstract. Despite the widespread adoption of Role-based Access Control (RBAC) models, new access control models are required for new applications for which RBAC may not be especial...
Clara Bertolissi, Maribel Fernández, Steve ...
HT
2000
ACM
13 years 12 months ago
Arguments in hypertext: a rhetorical approach
The qualities of non-sequentiality that make hypertext so appealing to writers and readers of informative and literary texts are also those that problematize arguments in the same...
Locke M. Carter
CORR
2008
Springer
106views Education» more  CORR 2008»
13 years 7 months ago
Spectral efficiency and optimal medium access control of random access systems over large random spreading CDMA
This paper analyzes the spectral efficiency as a function of medium access control (MAC) for large random spreading CDMA random access systems that employ a linear receiver. It is ...
Yi Sun