Sciweavers

769 search results - page 23 / 154
» Policy Storage for Role-Based Access Control Systems
Sort
View
STTT
2008
134views more  STTT 2008»
13 years 8 months ago
Automated verification of access control policies using a SAT solver
Abstract. Managing access control policies in modern computer systems can be challenging and error-prone. Combining multiple disparate access policies can introduce unintended cons...
Graham Hughes, Tevfik Bultan
SIS
2008
13 years 10 months ago
Network Access Control Interoperation using Semantic Web Techniques
Network Access Control requirements are typically implemented in practice as a series of heterogeneous security-mechanism-centric policies that span system services and application...
William M. Fitzgerald, Simon N. Foley, Mích...
FAST
2009
13 years 6 months ago
Dynamic Resource Allocation for Database Servers Running on Virtual Storage
We introduce a novel multi-resource allocator to dynamically allocate resources for database servers running on virtual storage. Multi-resource allocation involves proportioning t...
Gokul Soundararajan, Daniel Lupei, Saeed Ghanbari,...
POLICY
2004
Springer
14 years 2 months ago
Cassandra: Distributed Access Control Policies with Tunable Expressiveness
We study the specification of access control policy in large-scale distributed systems. Our work on real-world policies has shown that standard policy idioms such as role hierarc...
Moritz Y. Becker, Peter Sewell
ESORICS
2009
Springer
14 years 3 months ago
Visualizing Privacy Implications of Access Control Policies in Social Network Systems
Wehypothesizethat, inaFacebook-stylesocial networksystem, proper visualization of one’s extended neighbourhood could help the user understand the privacy implications of her acce...
Mohd M. Anwar, Philip W. L. Fong, Xue-Dong Yang, H...