Sciweavers

1112 search results - page 11 / 223
» Implementation aspects of a delegation system
Sort
View
POLICY
2004
Springer
14 years 1 months ago
Cassandra: Distributed Access Control Policies with Tunable Expressiveness
We study the specification of access control policy in large-scale distributed systems. Our work on real-world policies has shown that standard policy idioms such as role hierarc...
Moritz Y. Becker, Peter Sewell
SACMAT
2004
ACM
14 years 2 months ago
Implementing access control to people location information
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...
Urs Hengartner, Peter Steenkiste
OWLED
2007
13 years 10 months ago
An Extension of DIG 2.0 for Handling Bulk Data
The research community has noted the need to retrieve the instance level of an ontology from bulk data stored in external data sources (e.g., a relational database), in order to de...
Diego Calvanese, Mariano Rodriguez-Muro
AOSD
2007
ACM
14 years 18 days ago
Interrupt synchronization in the CiAO operating system: experiences from implementing low-level system policies by AOP
Configurability is a major issue in the domain of embedded system software. Existing systems specifically lack good techniques to implement configurability of architectural OS con...
Daniel Lohmann, Jochen Streicher, Olaf Spinczyk, W...
ICDCS
2002
IEEE
14 years 1 months ago
dRBAC: Distributed Role-based Access Control for Dynamic Coalition Environments
Distributed Role-Based Access Control (dRBAC) is a scalable, decentralized trust-management and accesscontrol mechanism for systems that span multiple administrative domains. dRBA...
Eric Freudenthal, Tracy Pesin, Lawrence Port, Edwa...