Sciweavers

852 search results - page 81 / 171
» Model-Checking Access Control Policies
Sort
View
IEEEARES
2008
IEEE
14 years 4 months ago
Hierarchical Domains for Decentralized Administration of Spatially-Aware RBAC Systems
Emerging models for context-aware role-based access control pose challenging requirements over policy administration. In this paper we address the issues raised by the decentraliz...
Maria Luisa Damiani, Claudio Silvestri, Elisa Bert...
INFOCOM
2000
IEEE
14 years 2 months ago
Receiver Based Management of Low Bandwidth Access Links
Abstract—In this paper, we describe a receiver based congestion control policy that leverages TCP flow control mechanisms to prioritize mixed traffic loads across access links....
Neil T. Spring, Maureen Chesire, Mark Berryman, Vi...
NOMS
2000
IEEE
14 years 2 months ago
POWER prototype: towards integrated policy-based management
ot only high level description of abstract policy, but also enables such policy to be refined and eventually mapped into an appropriate configuration for controlling devices in the...
Marco Casassa Mont, Adrian Baldwin, Cheh Goh
SACMAT
2010
ACM
14 years 2 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
EDBT
2006
ACM
177views Database» more  EDBT 2006»
14 years 10 months ago
Authorization-Transparent Access Control for XML Under the Non-Truman Model
In authorization-transparent access control, users formulate their queries against the database schema rather than against authorization views that transform and hide data. The Tru...
Alberto O. Mendelzon, Renée J. Miller, Yaro...