Sciweavers

798 search results - page 13 / 160
» Comparing the expressive power of access control models
Sort
View
ECUMN
2007
Springer
14 years 1 months ago
Enforcing Access Control Using Risk Assessment
Context-based access control is an emerging approach for modeling adaptive solution, making access control management more flexible and powerful. But in the ubiquitous environment...
Nguyen Ngoc Diep, Le Xuan Hung, Yonil Zhung, Sungy...
BMCBI
2006
149views more  BMCBI 2006»
13 years 7 months ago
HeatMapper: powerful combined visualization of gene expression profile correlations, genotypes, phenotypes and sample characteri
Background: Accurate interpretation of data obtained by unsupervised analysis of large scale expression profiling studies is currently frequently performed by visually combining s...
Roel G. W. Verhaak, Mathijs A. Sanders, Maarten A....
ASPDAC
2005
ACM
123views Hardware» more  ASPDAC 2005»
14 years 1 months ago
Comparing high-level modeling approaches for embedded system design
- This paper presents a comparison between three different high-level modeling approaches for embedded systems design, focusing on systems that require dataflow models. The propose...
Lisane B. de Brisolara, Leandro Buss Becker, Luigi...
WORDS
2005
IEEE
14 years 1 months ago
A Role-Based Access Control Policy Verification Framework for Real-Time Systems
This paper presents a framework for verifying the access control requirements of real-time application systems such as workflow management systems and active databases. The tempor...
Basit Shafiq, Ammar Masood, James Joshi, Arif Ghaf...
SACMAT
2004
ACM
14 years 1 months ago
Towards a credential-based implementation of compound access control policies
We describe a layered approach to access control for distributed and interoperable computing systems. Firstly, compound access control policies are conceptually specified, using ...
Joachim Biskup, Sandra Wortmann