Sciweavers

173 search results - page 15 / 35
» Evaluating Access Control Policies Through Model Checking
Sort
View
ICEBE
2009
IEEE
157views Business» more  ICEBE 2009»
13 years 5 months ago
Trust-Based Access Control for Privacy Protection in Collaborative Environment
Privacy has been acknowledged to be a critical requirement for many business environments. A variety of uncertainty and mutability poses challenges when sharing resources must happ...
Min Li, Hua Wang, David Ross
WSC
2004
13 years 9 months ago
Air Cargo Operations Evaluation and Analysis through Simulation
This paper illustrates the use of simulation for evaluating and analyzing air cargo operations at one of the new stateof-the art cargo facilities at Toronto Pearson Airport. The e...
Aaron Luntala Nsakanda, Michel Turcotte, Moustapha...
ICTAC
2005
Springer
14 years 1 months ago
Representation and Reasoning on RBAC: A Description Logic Approach
Abstract. Role-based access control (RBAC) is recognized as an excellent model for access control in large-scale networked applications. Formalization of RBAC in a logical approach...
Chen Zhao, NuerMaimaiti Heilili, Shengping Liu, Zu...
MODELS
2007
Springer
14 years 1 months ago
A Metamodel-Based Approach for Analyzing Security-Design Models
Abstract We have previously proposed an expressive UML-based language for constructing and transforming security-design models, which are models that combine design specifications...
David A. Basin, Manuel Clavel, Jürgen Doser, ...
SAC
2010
ACM
14 years 2 months ago
Towards fine-grained and application-centric access control for wireless sensor networks
The emerging reality of wireless sensor networks deployed as long-lived infrastructure required to serve multiple applications necessitates the development of fine-grained securi...
Nelson Matthys, Syed Rehan Afzal, Christophe Huyge...