Sciweavers

427 search results - page 12 / 86
» Implementing Real-Time Update of Access Control Policies
Sort
View
137
Voted
CBMS
2006
IEEE
15 years 9 months ago
How to Break Access Control in a Controlled Manner
The Electronic Medical Record (EMR) integrates heterogeneous information within a Healthcare Institution stressing the need for security and access control. The Biostatistics and ...
Ana Ferreira, Ricardo João Cruz Correia, Lu...
ICSE
2007
IEEE-ACM
16 years 3 months ago
Testing and Analysis of Access Control Policies
Policy testing and analysis are important techniques for high assurance of correct specification of access control policies. We propose a set of testing and analysis techniques fo...
Evan Martin
POLICY
2004
Springer
15 years 8 months ago
Cassandra: Distributed Access Control Policies with Tunable Expressiveness
We study the specification of access control policy in large-scale distributed systems. Our work on real-world policies has shown that standard policy idioms such as role hierarc...
Moritz Y. Becker, Peter Sewell
RTCSA
2005
IEEE
15 years 8 months ago
Service Delivery in Context Aware Environments: Lookup and Access Control Issues
Large-scale distributed systems, such as ubiquitous computing environments, require a service delivery mechanism in order to keep track of the vast set of services offered and mak...
Maria Riaz, Saad Liaquat Kiani, Sungyoung Lee, San...
FOSAD
2000
Springer
15 years 6 months ago
Access Control: Policies, Models, and Mechanisms
Access control is the process of mediating every request to resources and data maintained by a system and determining whether the request should be granted or denied. The access co...
Pierangela Samarati, Sabrina De Capitani di Vimerc...