Sciweavers

852 search results - page 51 / 171
» Model-Checking Access Control Policies
Sort
View
CSFW
2006
IEEE
14 years 4 months ago
Non-Interference in Constructive Authorization Logic
We present a constructive authorization logic where the meanings of connectives are defined by their associated inference rules. This ensures that the logical reading of access c...
Deepak Garg, Frank Pfenning
SACMAT
2009
ACM
14 years 4 months ago
An algebra for fine-grained integration of XACML policies
Collaborative and distributed applications, such as dynamic coalitions and virtualized grid computing, often require integrating access control policies of collaborating parties. ...
Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, ...
CSE
2009
IEEE
14 years 4 months ago
A Framework for Enforcing Constrained RBAC Policies
—Constraints are an important part of role-based access control policies. The safety or security of a system is maintained by enforcing constraints that are specified in the pol...
Jason Crampton, Hemanth Khambhammettu
CORR
2008
Springer
84views Education» more  CORR 2008»
13 years 10 months ago
Rate and Power Allocation in Fading Multiple Access Channels
Abstract-- We consider the problem of rate and power allocation in a fading multiple-access channel. Our objective is to obtain rate and power allocation policies that maximize a u...
Ali ParandehGheibi, Atilla Eryilmaz, Asuman E. Ozd...
CNIS
2006
13 years 11 months ago
STRBAC - An approach towards spatio-temporal role-based access control
The rapid emergence of GPS enabled devices, sensors and mobile equipment in commercial as well as government organizations has led to considerable research in time- and location-b...
Mahendra Kumar, Richard E. Newman