Sciweavers

151 search results - page 3 / 31
» On Testing for Absence of Rights in Access Control Models
Sort
View
IJIEM
2007
113views more  IJIEM 2007»
13 years 7 months ago
Fairness concerns in digital right management models
: Digital piracy is threatening the global multimedia content industry and blindly applied coercive Digital Right Management (DRM) policies do nothing but legitimizing this piracy....
Luc Bouganim, Philippe Pucheral
WWW
2007
ACM
14 years 8 months ago
A fault model and mutation testing of access control policies
To increase confidence in the correctness of specified policies, policy developers can conduct policy testing by supplying typical test inputs (requests) and subsequently checking...
Evan Martin, Tao Xie
VR
2008
IEEE
129views Virtual Reality» more  VR 2008»
14 years 1 months ago
Object-Capability Security in Virtual Environments
Access control is an important aspect of shared virtual environments. Resource access may not only depend on prior authorization, but also on context of usage such as distance or ...
Martin Scheffler, Jan P. Springer, Bernd Froehlich
ESORICS
1994
Springer
13 years 11 months ago
On the Expressive Power of the Unary Transformation Model
The Transformation Model TRM was recently introduced 10 in the literature by Sandhu and Ganta. TRM is based on the concept of transformation of rights. The propagation of access ri...
Ravi S. Sandhu, Srinivas Ganta
CN
2007
111views more  CN 2007»
13 years 7 months ago
Key management for content access control in a hierarchy
The need for content access control in hierarchies (CACH) appears naturally in all contexts where a set of users have different access rights to a set of resources. The hierarchy...
H. Ragab Hassen, Abdelmadjid Bouabdallah, Hatem Be...