Sciweavers

241 search results - page 32 / 49
» Implementation of a discretionary access control model for s...
Sort
View
TISSEC
2010
142views more  TISSEC 2010»
13 years 3 months ago
A logical specification and analysis for SELinux MLS policy
The SELinux mandatory access control (MAC) policy has recently added a multi-level security (MLS) model which is able to express a fine granularity of control over a subject'...
Boniface Hicks, Sandra Rueda, Luke St. Clair, Tren...
MODELLIERUNG
2008
13 years 10 months ago
Modelling Security Goals in Business Processes
: Various types of security goals, such as authentication or confidentiality, can be defined as policies for process-aware information systems, typically in a manual fashion. There...
Christian Wolter, Michael Menzel, Christoph Meinel
UM
2009
Springer
14 years 3 months ago
Evaluating Three Scrutability and Three Privacy User Privileges for a Scrutable User Modelling Infrastructure
This paper describes the evaluation of a Scrutable User Modelling Infrastructure. SUMI is intended to form a service to allow users to share their user models from social e-network...
Demetris Kyriacou, Hugh C. Davis, Thanassis Tiropa...
DBSEC
2001
129views Database» more  DBSEC 2001»
13 years 10 months ago
Secure Role-Based Workflow Models
: In this paper we introduce a series of reference models for Secure Role-Based Workflow systems. We build our models over the well-known RBAC96 framework. 96 model supports the no...
Savith Kandala, Ravi S. Sandhu
ACSC
2005
IEEE
14 years 2 months ago
A High Performance Kernel-Less Operating System Architecture
Operating Systems provide services that are accessed by processes via mechanisms that involve a ring transition to transfer control to the kernel where the required function is pe...
Amit Vasudevan, Ramesh Yerraballi, Ashish Chawla