Abstract. This paper presents an access control model for programming applications in which the access control to resources can employ user interaction to obtain the necessary perm...
We present a model-based approach to testing access control requirements. By using combinatorial testing, we first automatically generate test cases from and without access contro...
Alexander Pretschner, Tejeddine Mouelhi, Yves Le T...
One of the major threats that an enterprise Information system networks are facing today is the Insider threat. As part of the Insider Threat study, lack of an effective access co...
— This paper presents C-MAC, a new MAC protocol designed to achieve high-throughput bulk communication for dataintensive sensing applications. C-MAC exploits concurrent wireless ...
Mo Sha, Guoliang Xing, Gang Zhou, Shucheng Liu, Xi...
The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resource...