Sciweavers

852 search results - page 63 / 171
» Model-Checking Access Control Policies
Sort
View
SOCIALCOM
2010
13 years 8 months ago
OSNAC: An Ontology-based Access Control Model for Social Networking Systems
Abstract--As the information flowing around in social networking systems is mainly related or can be attributed to their users, controlling access to such information by individual...
Amirreza Masoumzadeh, James B. D. Joshi
ICTAI
2000
IEEE
14 years 2 months ago
Designing a learning-automata-based controller for client/server systems: a methodology
Abstract— Polling policies have been introduced to simplify the accessing process in client/server systems by a centralized control access scheme. This paper considers a client/s...
Georgios I. Papadimitriou, Athena Vakali, Andreas ...
CCS
2007
ACM
14 years 2 months ago
Efficient techniques for realizing geo-spatial access control
The problem of key management for access control systems has been well-studied, and the literature contains several schemes for hierarchy-based and temporal-based access control. ...
Mikhail J. Atallah, Marina Blanton, Keith B. Frikk...
DRM
2008
Springer
13 years 12 months ago
Enforcing DRM policies across applications
In this paper we present Trishul-UCON (T-UCON), a DRM system based on the UCONABC model. T-UCON is designed to be capable of enforcing not only application-specific policies, as a...
Srijith Krishnan Nair, Andrew S. Tanenbaum, Gabrie...
IJNSEC
2006
112views more  IJNSEC 2006»
13 years 10 months ago
An Access Control System with Time-constraint Using Support Vector Machines
Access control is an important issue in information security. It is a necessary mechanism for protecting data in a computer system. In this paper, we apply support vector machines...
Chin-Chen Chang, Iuon-Chang Lin, Chia-Te Liao