Sciweavers

852 search results - page 117 / 171
» Model-Checking Access Control Policies
Sort
View
ITCC
2005
IEEE
14 years 2 months ago
Event-Based Blackboard Architecture for Multi-Agent Systems
Developing large multi-agent systems is a complex task involving the processes of the requirement, architecture, design and implementation of these systems. In particular, the arc...
Jing Dong, Shanguo Chen, Jun-Jang Jeng
ICDM
2007
IEEE
135views Data Mining» more  ICDM 2007»
14 years 3 months ago
Private Inference Control for Aggregate Database Queries
Data security is a critical issue for many organizations. Sensitive data must be protected from both inside and outside attackers. Access control policies and related mechanisms h...
Geetha Jagannathan, Rebecca N. Wright
ACSAC
2009
IEEE
14 years 3 months ago
How to Securely Break into RBAC: The BTG-RBAC Model
—Access control models describe frameworks that dictate how subjects (e.g. users) access resources. In the Role-Based Access Control (RBAC) model access to resources is based on ...
Ana Ferreira, David W. Chadwick, Pedro Farinha, Ri...
TACAS
2010
Springer
210views Algorithms» more  TACAS 2010»
14 years 3 months ago
Automatic Analysis of Scratch-Pad Memory Code for Heterogeneous Multicore Processors
Modern multicore processors, such as the Cell Broadband Engine, achieve high performance by equipping accelerator cores with small “scratchpad” memories. The price for increase...
Alastair F. Donaldson, Daniel Kroening, Philipp R&...
JCS
2010
122views more  JCS 2010»
13 years 7 months ago
Provably correct inline monitoring for multithreaded Java-like programs
Inline reference monitoring is a powerful technique to enforce security policies on untrusted programs. The security-by-contract paradigm proposed by the EU FP6 S3 MS project uses...
Mads Dam, Bart Jacobs 0002, Andreas Lundblad, Fran...