Sciweavers

1627 search results - page 176 / 326
» On context in authorization policy
Sort
View
SERP
2010
13 years 8 months ago
Role Explosion: Acknowledging the Problem
- In large enterprises subject to constant employee turnover and challenging security policies, the administration of Role-based Access Control (RBAC) is a daunting task that is of...
Aaron Elliott, Scott Knight
ECRTS
2009
IEEE
13 years 8 months ago
Semi-partitioned Scheduling of Sporadic Task Systems on Multiprocessors
This paper presents a new algorithm for scheduling of sporadic task systems with arbitrary deadlines on identical multiprocessor platforms. The algorithm is based on the concept o...
Shinpei Kato, Nobuyuki Yamasaki, Yutaka Ishikawa
ICISS
2010
Springer
13 years 7 months ago
Unifying Facets of Information Integrity
Abstract. Information integrity is a vital security property in a variety of applications. However, there is more than one facet to integrity: interpretations of integrity in diffe...
Arnar Birgisson, Alejandro Russo, Andrei Sabelfeld
SBMF
2010
Springer
132views Formal Methods» more  SBMF 2010»
13 years 5 months ago
Midlet Navigation Graphs in JML
Abstract. In the context of the EU project Mobius on Proof Carrying Code for Java programs (midlets) on mobile devices, we present a way to express midlet navigation graphs in JML....
Wojciech Mostowski, Erik Poll
ECOOP
2005
Springer
14 years 3 months ago
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection
In Java 2 and Microsoft .NET Common Language Runtime (CLR), trusted code has often been programmed to perform accessrestricted operations not explicitly requested by its untrusted ...
Marco Pistoia, Robert J. Flynn, Larry Koved, Vugra...