Sciweavers

123 search results - page 6 / 25
» D-algebra for composing access control policy decisions
Sort
View
MABS
2004
Springer
14 years 27 days ago
A Hybrid Micro-Simulator for Determining the Effects of Governmental Control Policies on Transport Chains
Abstract. A simulation-based tool is described which will be used to investigate how the actors in a transport chain are expected to act when different types of governmental contro...
Markus Bergkvist, Paul Davidsson, Jan A. Persson, ...
SACMAT
2006
ACM
14 years 1 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
SDMW
2009
Springer
14 years 2 months ago
An Access Control Language for a General Provenance Model
Provenance access control has been recognized as one of the most important components in an enterprise-level provenance system. However, it has only received little attention in th...
Qun Ni, Shouhuai Xu, Elisa Bertino, Ravi S. Sandhu...
CCS
2004
ACM
14 years 28 days ago
Attestation-based policy enforcement for remote access
Intranet access has become an essential function for corporate users. At the same time, corporation’s security administrators have little ability to control access to corporate ...
Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leende...
CDC
2008
IEEE
197views Control Systems» more  CDC 2008»
14 years 2 months ago
Dynamic spectrum access policies for cognitive radio
—We study the problem of dynamic spectrum sensing and access in cognitive radio systems as a partially observed Markov decision process (POMDP). A group of cognitive users cooper...
Jayakrishnan Unnikrishnan, Venugopal V. Veeravalli