Sciweavers

852 search results - page 79 / 171
» Model-Checking Access Control Policies
Sort
View
CORR
2006
Springer
126views Education» more  CORR 2006»
13 years 10 months ago
Power Control for User Cooperation
For a fading Gaussian multiple access channel with user cooperation, we obtain the optimal power allocation policies that maximize the rates achievable by block Markov superpositi...
Onur Kaya, Sennur Ulukus
SACMAT
2003
ACM
14 years 3 months ago
Dependencies and separation of duty constraints in GTRBAC
A Generalized Temporal Role Based Access Control (GTRBAC) model that captures an exhaustive set of temporal constraint needs for access control has recently been proposed. GTRBACā...
James Joshi, Basit Shafiq, Arif Ghafoor, Elisa Ber...
CSFW
2004
IEEE
14 years 1 months ago
Owned Policies for Information Security
In many systems, items of information have owners associated with them. An owner of an item of information may want the system to enforce a policy that restricts use of that infor...
Hubie Chen, Stephen Chong
EUROPKI
2005
Springer
14 years 3 months ago
A Heterogeneous Network Access Service Based on PERMIS and SAML
Abstract The expansion of inter-organizational scenarios based on different authorization schemes involves the development of integration solutions allowing diļ¬€erent authorizatio...
Gabriel López Millán, Óscar C...
CONCUR
2001
Springer
14 years 2 months ago
Reasoning about Security in Mobile Ambients
The paper gives an assessment of security for Mobile Ambients, with speciļ¬c focus on mandatory access control (MAC) policies in multilevel security systems. The ļ¬rst part of th...
Michele Bugliesi, Giuseppe Castagna, Silvia Crafa