Sciweavers

8658 search results - page 149 / 1732
» Models of Command and Control
Sort
View
WER
2007
Springer
14 years 3 months ago
Role-Based Access Control Requirements Model with Purpose Extension
Role-Based Access Control (RBAC) is increasingly used for ensuring security and privacy in complex organizations such as healthcare institutions. In RBAC, access permissions are g...
Faranak Farzad, Eric Yu, Patrick C. K. Hung
IPCCC
2007
IEEE
14 years 3 months ago
Applications of the Oriented Permission Role-Based Access Control Model
Role-based access control and role hierarchies have been the subject of considerable research in recent years. In this paper, we consider three useful applications of a new role-b...
Liang Chen, Jason Crampton
NIPS
2004
13 years 10 months ago
Learning first-order Markov models for control
First-order Markov models have been successfully applied to many problems, for example in modeling sequential data using Markov chains, and modeling control problems using the Mar...
Pieter Abbeel, Andrew Y. Ng
CCS
2006
ACM
14 years 29 days ago
Safety analysis of usage control authorization models
The usage control (UCON) model was introduced as a unified approach to capture a number of extensions for traditional access control models. While the policy specification flexibi...
Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Pre...
QUESTA
2000
56views more  QUESTA 2000»
13 years 9 months ago
On the value function of a priority queue with an application to a controlled polling model
We give a closed-form expression for the discounted weighted queue length and switching costs of a two-class single-server queueing model under a preemptive priority rule. These e...
Ger Koole, Philippe Nain