Sciweavers

882 search results - page 76 / 177
» On the Negotiation of Access Control Policies
Sort
View
IEEEARES
2007
IEEE
14 years 2 months ago
A Near-Real-Time Behaviour Control Framework
The NuBric behaviour control framework (BCF) is a near-real-time framework written entirely in Java based on the paradigms of both role based access control (RBAC) and policy base...
Bastian Preindl, Alexander Schatten
QOFIS
2004
Springer
14 years 1 months ago
Load Analysis of Topology-Unaware TDMA MAC Policies for Ad Hoc Networks
Medium Access Control (MAC) policies in which the scheduling time slots are allocated irrespectively of the underline topology are suitable for ad-hoc networks, where nodes can ent...
Konstantinos Oikonomou, Ioannis Stavrakakis
CCS
2009
ACM
14 years 8 months ago
Semantic context aware security policy deployment
The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the secur...
Frédéric Cuppens, Joaquín Gar...
WETICE
2008
IEEE
14 years 2 months ago
On the Modeling of Bell-LaPadula Security Policies Using RBAC
The Bell-LaPadula security model is a hybrid model that combines mandatory access controls and discretionary access controls. The Bell-LaPadula security model has been widely acce...
Gansen Zhao, David W. Chadwick
CCS
2010
ACM
13 years 6 months ago
Adjustable autonomy for cross-domain entitlement decisions
Cross-domain information exchange is a growing problem, as business and governmental organizations increasingly need to integrate their information systems with those of partially...
Jacob Beal, Jonathan Webb, Michael Atighetchi