Sciweavers

151 search results - page 8 / 31
» On Testing for Absence of Rights in Access Control Models
Sort
View
126
Voted
CCS
2006
ACM
15 years 7 months ago
Safety analysis of usage control authorization models
The usage control (UCON) model was introduced as a unified approach to capture a number of extensions for traditional access control models. While the policy specification flexibi...
Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Pre...
152
Voted
ADC
2008
Springer
114views Database» more  ADC 2008»
15 years 5 months ago
An Integrated Access Control for Securely Querying and Updating XML Data
Many existing access controls use node filtering or querying rewriting techniques. These techniques require rather time-consuming processes such as parsing, labeling, pruning and/...
Maggie Duong, Yanchun Zhang
125
Voted
PTS
2008
98views Hardware» more  PTS 2008»
15 years 5 months ago
Modular System Verification by Inference, Testing and Reachability Analysis
Verification of a modular system composed of communicating components is a difficult problem, especially when the models of the components are not available. Conventional testing t...
Roland Groz, Keqin Li 0002, Alexandre Petrenko, Mu...
145
Voted
ACSAC
2002
IEEE
15 years 8 months ago
Advanced Features for Enterprise-Wide Role-Based Access Control
The administration of users and access rights in large enterprises is a complex and challenging task. Roles are a powerful concept for simplifying access control, but their implem...
Axel Kern
164
Voted
ICNS
2006
IEEE
15 years 9 months ago
Building Distributed Access Control System Using Service-Oriented Programming Model
– Service-Oriented Programming Model is a new methodology for building service-oriented applications. In the Service-Oriented Programming Model, an application is assembled from ...
Ivan Zuzak, Sinisa Srbljic, Ivan Benc