Sciweavers

882 search results - page 14 / 177
» On the Negotiation of Access Control Policies
Sort
View
ICSE
2007
IEEE-ACM
14 years 8 months ago
Testing and Analysis of Access Control Policies
Policy testing and analysis are important techniques for high assurance of correct specification of access control policies. We propose a set of testing and analysis techniques fo...
Evan Martin
MODELS
2007
Springer
14 years 2 months ago
Modeling and Enforcing Advanced Access Control Policies in Healthcare Systems with Sectet
Abstract. This contribution gives an overview of various access control strategies in use in contemporary healthcare scenarios and shows how a broad variety of respective policies ...
Michael Hafner, Mukhtiar Memon, Muhammad Alam
CSREASAM
2009
13 years 9 months ago
Incremental Information Flow Analysis of Role Based Access Control
Role-Based Access Control (RBAC) has been widely used for expressing access control policies. Although RBAC provides flexible mechanisms to control the access to information, it do...
Mikhail I. Gofman, Ruiqi Luo, Jian He, Yingbin Zha...
TASE
2007
IEEE
14 years 2 months ago
Constraint-Based Policy Negotiation and Enforcement for Telco Services
Telco services are evolving under several aspects: for instance, services may combine different telecommunication features (messaging, multi-media, etc.) and may be activated and...
Maria Grazia Buscemi, Laura Ferrari, Corrado Moiso...
DBSEC
2007
131views Database» more  DBSEC 2007»
13 years 9 months ago
Dynamic Event-Based Access Control as Term Rewriting
Abstract. Despite the widespread adoption of Role-based Access Control (RBAC) models, new access control models are required for new applications for which RBAC may not be especial...
Clara Bertolissi, Maribel Fernández, Steve ...