Sciweavers

4118 search results - page 11 / 824
» Mechanisms for usage control
Sort
View
CCS
2008
ACM
13 years 10 months ago
Usage control platformization via trustworthy SELinux
Masoom Alam, Jean-Pierre Seifert, Qi Li, Xinwen Zh...
INTR
2002
45views more  INTR 2002»
13 years 8 months ago
Abnormal Web usage control by proxy strategies
Hsiang-Fu Yu, Li-Ming Tseng
DBSEC
2006
115views Database» more  DBSEC 2006»
13 years 9 months ago
Creating Objects in the Flexible Authorization Framework
Access control is a crucial concern to build secure IT systems and, more specifically, to protect the confidentiality of information. However, access control is necessary, but not ...
Nicola Zannone, Sushil Jajodia, Duminda Wijesekera
ATAL
2005
Springer
14 years 1 months ago
A scalable approach to multi-agent resource acquisition and control
Scalable coordination is a key challenge in deployment of multiagent systems. Resource usage is one part of agent behavior which naturally lends itself to abstraction. CyberOrgs i...
Nadeem Jamali, Xinghui Zhao