Sciweavers

427 search results - page 38 / 86
» Implementing Real-Time Update of Access Control Policies
Sort
View
141
Voted
JCP
2007
153views more  JCP 2007»
15 years 3 months ago
An Integrated Educational Platform Implementing Real, Remote Lab-Experiments for Electrical Engineering Courses
—This paper describes an Internet-based laboratory, named Remote Monitored and Controlled Laboratory (RMCLab) developed at University of Patras, Greece, for electrical engineerin...
Dimitris Karadimas, Kostas Efstathiou
SACMAT
2009
ACM
15 years 10 months ago
Trojan horse resistant discretionary access control
Modern operating systems primarily use Discretionary Access Control (DAC) to protect files and other operating system resources. DAC mechanisms are more user-friendly than Mandat...
Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang
121
Voted
ICWE
2004
Springer
15 years 8 months ago
Reliable and Adaptable Security Engineering for Database-Web Services
The situation in engineering security for Web services that access databases is as follows: On the one hand, specifications like WSSecurity are concerned with the security managem...
Martin Wimmer, Daniela Eberhardt, Pia Ehrnlechner,...
WETICE
2008
IEEE
15 years 9 months ago
On the Modeling of Bell-LaPadula Security Policies Using RBAC
The Bell-LaPadula security model is a hybrid model that combines mandatory access controls and discretionary access controls. The Bell-LaPadula security model has been widely acce...
Gansen Zhao, David W. Chadwick
122
Voted
CN
2000
76views more  CN 2000»
15 years 3 months ago
Supporting reconfigurable security policies for mobile programs
Programming models that support code migration have gained prominence, mainly due to a widespread shift from stand-alone to distributed applications. Although appealing in terms o...
Brant Hashii, Scott Malabarba, Raju Pandey, Matt B...