Sciweavers

882 search results - page 52 / 177
» On the Negotiation of Access Control Policies
Sort
View
ECOOP
1999
Springer
14 years 8 days ago
Providing Fine-grained Access Control for Java Programs
There is considerable interest in programs that can migrate from one host to another and execute. Mobile programs are appealing because they support efficient utilization of networ...
Raju Pandey, Brant Hashii
ACSAC
2006
IEEE
14 years 2 months ago
Shamon: A System for Distributed Mandatory Access Control
We define and demonstrate an approach to securing distributed computation based on a shared reference monitor (Shamon) that enforces mandatory access control (MAC) policies acros...
Jonathan M. McCune, Trent Jaeger, Stefan Berger, R...
MMMACNS
2005
Springer
14 years 1 months ago
Foundation for a Time Interval Access Control Model
A new model for representing temporal access control policies is introduced. In this model, temporal authorizations are represented by time attributes associated with both subjects...
Francis B. Afinidad, Timothy E. Levin, Cynthia E. ...
ACISP
2003
Springer
14 years 1 months ago
A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems
Abstract. This paper examines the access control requirements of distributed health care information networks. Since the electronic sharing of an individual’s personal health inf...
Jason Reid, Ian Cheong, Matthew Henricksen, Jason ...
ICRA
2008
IEEE
197views Robotics» more  ICRA 2008»
14 years 2 months ago
Approximate optimal control of the compass gait on rough terrain
Abstract— In this paper, we explore the capabilities of actuated models of the compass gait walker on rough terrain. We solve for the optimal high-level feedback policy to negoti...
Katie Byl, Russ Tedrake