Sciweavers

798 search results - page 24 / 160
» Comparing the expressive power of access control models
Sort
View
IFIP
2005
Springer
14 years 1 months ago
Type-Based Distributed Access Control vs. Untyped Attackers
This paper considers the effect of untyped attackers inside a distributed system where security is enforced by the type system. In previous work we introduced the Key-Based Decentr...
Tom Chothia, Dominic Duggan
BMCBI
2010
152views more  BMCBI 2010»
13 years 7 months ago
Comparative study of three commonly used continuous deterministic methods for modeling gene regulation networks
Background: A gene-regulatory network (GRN) refers to DNA segments that interact through their RNA and protein products and thereby govern the rates at which genes are transcribed...
Martin T. Swain, Johannes J. Mandel, Werner Dubitz...
HOTI
2008
IEEE
14 years 2 months ago
NoC with Near-Ideal Express Virtual Channels Using Global-Line Communication
As processor core counts increase, networks-on-chip (NoCs) are becoming an increasingly popular interconnection fabric due to their ability to supply high bandwidth. However, NoCs...
Tushar Krishna, Amit Kumar 0002, Patrick Chiang, M...
ESOP
2004
Springer
14 years 1 months ago
A Dependently Typed Ambient Calculus
The Ambient calculus is a successful model of distributed, mobile computation, and has been the vehicle of new ideas for resource access control. Mobility types have been used to e...
Cédric Lhoussaine, Vladimiro Sassone
ESORICS
2006
Springer
13 years 11 months ago
Delegation in Role-Based Access Control
User delegation is a mechanism for assigning access rights available to a user to another user. A delegation operation can either be a grant or transfer operation. Delegation for r...
Jason Crampton, Hemanth Khambhammettu