Sciweavers

16843 search results - page 88 / 3369
» On Generalized Authorization Problems
Sort
View
CSE
2009
IEEE
14 years 2 months ago
A Framework for Enforcing Constrained RBAC Policies
—Constraints are an important part of role-based access control policies. The safety or security of a system is maintained by enforcing constraints that are specified in the pol...
Jason Crampton, Hemanth Khambhammettu
CONCUR
2004
Springer
13 years 12 months ago
A General Approach to Comparing Infinite-State Systems with Their Finite-State Specifications
We introduce a generic family of behavioral relations for which the problem of comparing an arbitrary transition system to some finite-state specification can be reduced to a model...
Antonín Kucera, Ph. Schnoebelen
SDMW
2004
Springer
14 years 1 months ago
Identifying Sensitive Associations in Databases for Release Control
In a database system, authorization-based access-control is generally the first line of defense, preventing unauthorized accesses to secret or sensitive data. However, this mechan...
Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodi...
ICALT
2009
IEEE
14 years 2 months ago
Adaptation Languages for Learning: The CAM Meta-model
Adaptive Hypermedia (AH) can offer a richer learning experience, tailored to students’ needs. However, authoring of AH is complex. Several models and systems have been developed...
Maurice Hendrix, Alexandra I. Cristea, Craig Stewa...
SIAMSC
2008
245views more  SIAMSC 2008»
13 years 8 months ago
A Globally Convergent Numerical Method for a Coefficient Inverse Problem
A survey of recent results of the authors is presented. This survey is short due to space limitations. A Coefficient Inverse Problem for a hyperbolic PDE with backscattering data ...
Larisa Beilina, Michael V. Klibanov