Sciweavers

5252 search results - page 35 / 1051
» Logic in Access Control
Sort
View
IEEECIT
2005
IEEE
14 years 4 months ago
Context-sensitive Access Control Model and Implementation
Context is a key factor in making make access control decision in modern information system. But a formal context model is needed to guide research of implementation of Context-se...
Weili Han, Junjing Zhang, Xiaobo Yao
INTR
2007
100views more  INTR 2007»
13 years 10 months ago
Web services access control architecture incorporating trust
Purpose – This paper seeks to investigate how the concept of a trust level is used in the access control policy of a web services provider in conjunction with the attributes of ...
Marijke Coetzee, Jan H. P. Eloff
IROS
2008
IEEE
137views Robotics» more  IROS 2008»
14 years 5 months ago
Universal web interfaces for robot control frameworks
— Developers and end-users have to interface robotic systems for control and feedback. Such systems are typically co-engineered with their graphical user interfaces. In the past,...
Jan Koch, Max Reichardt, Karsten Berns
EMSOFT
2007
Springer
14 years 2 months ago
Verification of device drivers and intelligent controllers: a case study
The soundness of device drivers generally cannot be verified in isolation, but has to take into account the reactions of the hardware devices. In critical embedded systems, interf...
David Monniaux
NTMS
2008
IEEE
14 years 5 months ago
Time and Location Based Services with Access Control
—We propose an access control model that extends RBAC (Role-Based Access Control) to take time and location into account, and use term rewriting systems to specify access control...
Clara Bertolissi, Maribel Fernández