Sciweavers

1627 search results - page 52 / 326
» On context in authorization policy
Sort
View
IEEEARES
2010
IEEE
14 years 29 days ago
Architecture-Aware Adaptive Deployment of Contextual Security Policies
—Deploying a security policy may prove difficult whenever the system does not embed all necessary security functionalities. Some specific functionalities are required to accura...
Stere Preda, Nora Cuppens-Boulahia, Fréd&ea...
DAGSTUHL
2007
13 years 9 months ago
Policy-based Home Care Systems
Abstract. Technology to support care at home is a promising alternative to traditional approaches. However, home care systems present significant technical challenges. For example,...
Feng Wang
FLAIRS
2007
13 years 10 months ago
Performance Analysis of Evolutionary Search with a Dynamic Restart Policy
In this work we explore how the complexity of a problem domain affects the performance of evolutionary search using a performance-based restart policy. Previous research indicates...
Michael Solano, Istvan Jonyer
CHI
2008
ACM
14 years 8 months ago
A user study of policy creation in a flexible access-control system
Significant effort has been invested in developing expressive and flexible access-control languages and systems. However, little has been done to evaluate these systems in practic...
Lujo Bauer, Lorrie Faith Cranor, Robert W. Reeder,...
ICSE
2007
IEEE-ACM
14 years 7 months ago
When Role Models Have Flaws: Static Validation of Enterprise Security Policies
Modern multiuser software systems have adopted RoleBased Access Control (RBAC) for authorization management. This paper presents a formal model for RBAC policy validation and a st...
Marco Pistoia, Stephen J. Fink, Robert J. Flynn, E...