Sciweavers

579 search results - page 44 / 116
» Policies, Models, and Languages for Access Control
Sort
View
TLT
2008
149views more  TLT 2008»
13 years 8 months ago
Control Your eLearning Environment: Exploiting Policies in an Open Infrastructure for Lifelong Learning
Abstract-- Nowadays, people are in need for continuous learning in order to keep up to date or to be upgraded in their job. An infrastructure for life-long learning requires contin...
Juri Luca De Coi, Philipp Kärger, Arne Wolf K...
AUTOMATICA
2005
108views more  AUTOMATICA 2005»
13 years 8 months ago
Robust optimal control of regular languages
This paper presents an algorithm for robust optimal control of regular languages under specified uncertainty bounds on the event cost parameters of the language measure that has b...
Constantino M. Lagoa, Jinbo Fu, Asok Ray
EDBT
2006
ACM
177views Database» more  EDBT 2006»
14 years 9 months ago
Authorization-Transparent Access Control for XML Under the Non-Truman Model
In authorization-transparent access control, users formulate their queries against the database schema rather than against authorization views that transform and hide data. The Tru...
Alberto O. Mendelzon, Renée J. Miller, Yaro...
SACMAT
2010
ACM
13 years 7 months ago
Enforcing spatial constraints for mobile RBAC systems
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the administrative and security advantages of RBAC with the dynamic nature of mobile and...
Michael S. Kirkpatrick, Elisa Bertino
CCS
2006
ACM
14 years 16 days ago
On the modeling and analysis of obligations
Traditional security policies largely focus on access control requirements, which specify who can access what under what circumstances. Besides access control requirements, the av...
Keith Irwin, Ting Yu, William H. Winsborough