Sciweavers

579 search results - page 42 / 116
» Policies, Models, and Languages for Access Control
Sort
View
ICFP
2008
ACM
14 years 8 months ago
AURA: a programming language for authorization and audit
This paper presents AURA, a programming language for access control that treats ordinary programming constructs (e.g., integers and recursive functions) and authorization logic co...
Limin Jia, Jeffrey A. Vaughan, Karl Mazurak, Jianz...
OWLED
2007
13 years 10 months ago
Mother, May I? OWL-based Policy Management at NASA
Abstract. Among the challenges of managing NASA’s information systems is the management (that is, creation, coordination, verification, validation, and enforcement) of many di...
Michael Smith, Andrew Schain, Kendall Clark, Arlen...
PPDP
2010
Springer
13 years 6 months ago
Rewrite-based verification of XML updates
We propose a model for XML update primitives of the W3C XQuery Update Facility as parameterized rewriting rules of the form: "insert an unranked tree from a regular tree lang...
Florent Jacquemard, Michaël Rusinowitch
CNIS
2006
13 years 10 months ago
STRBAC - An approach towards spatio-temporal role-based access control
The rapid emergence of GPS enabled devices, sensors and mobile equipment in commercial as well as government organizations has led to considerable research in time- and location-b...
Mahendra Kumar, Richard E. Newman
LREC
2008
120views Education» more  LREC 2008»
13 years 10 months ago
The U.S. Policy Agenda Legislation Corpus Volume 1 - a Language Resource from 1947 - 1998
We introduce the corpus of United States Congressional bills from 1947 to 1998 for use by language research communities. The U.S. Policy Agenda Legislation Corpus Volume 1 (USPALC...
Stephen Purpura, John Wilkerson, Dustin Hillard