Sciweavers

1627 search results - page 123 / 326
» On context in authorization policy
Sort
View
DLOG
2009
13 years 11 months ago
Using Description Logics in Relation Based Access Control
Relation Based Access Control (RelBAC) is an access control model designed for the new scenarios of access control on Web 2.0. Under this model, we discuss in this paper how to for...
Rui Zhang, Alessandro Artale, Fausto Giunchiglia, ...
PERCOM
2006
ACM
14 years 10 months ago
Criticality Aware Access Control Model for Pervasive Applications
In this paper we present a new framework for specifying access control policies in smart spaces called Criticality-Aware Access Control (CAAC). The main idea is to automatically r...
Sandeep K. S. Gupta, Tridib Mukherjee, Krishna K. ...
CIA
2007
Springer
14 years 4 months ago
Agent Behavior Alignment: A Mechanism to Overcome Problems in Agent Interactions During Runtime
When two or more agents interacting, their behaviors are not necessarily matching. Automated ways to overcome conicts in the behavior of agents can make the execution of interacti...
Gerben G. Meyer, Nicolae B. Szirbik
GLOBECOM
2008
IEEE
13 years 10 months ago
Security Rules Specification and Analysis Based on Passive Testing
Security is a critical issue in dynamic and open distributed environments such as network-based services or wireless networks. To ensure that a certain level of security is maintai...
Wissam Mallouli, Fayçal Bessayah, Ana R. Ca...
ACSAC
1999
IEEE
14 years 3 months ago
A Prototype Secure Workflow Server
Workflow systems provide automated support that enables organizations to efficiently and reliably move important data through their routine business processes. For some organizati...
Douglas L. Long, Julie Baker, Francis Fung