Sciweavers

1818 search results - page 36 / 364
» How users use access control
Sort
View
ISW
2004
Springer
14 years 2 months ago
Model-Checking Access Control Policies
We present a model of access control which provides fine-grained data-dependent control, can express permissions about permissions, can express delegation, and can describe syste...
Dimitar P. Guelev, Mark Ryan, Pierre-Yves Schobben...
CNSR
2005
IEEE
14 years 2 months ago
Managing Access Control for Presence-Based Services
This paper presents an approach for managing access to services over presence-based communications based on the context of the situation. This paper addresses two technical challe...
Anand Dersingh, Ramiro Liscano, Allan G. Jost
ICISC
2007
134views Cryptology» more  ICISC 2007»
13 years 10 months ago
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment
In Ubiquitous Computing Environment (UCE), service provider wants to provide its service to only legitimate users. Some users who belong to same service provider do not want to rev...
Jangseong Kim, Zeen Kim, Kwangjo Kim
TOOLS
1998
IEEE
14 years 1 months ago
The Interaction of Access Control and Object-Orientation in Extensible Systems
In this paper we describe how object-oriented language design interacts with access control in extensible systems, based on our experience in building the SPIN extensible operatin...
Wilson C. Hsieh, Przemyslaw Pardyak, Marc E. Fiucz...
MOBILITY
2009
ACM
14 years 1 months ago
Context-sensitive authorization in interaction patterns
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...