Sciweavers

769 search results - page 59 / 154
» Policy Storage for Role-Based Access Control Systems
Sort
View
CCS
2005
ACM
14 years 2 months ago
CPOL: high-performance policy evaluation
Policy enforcement is an integral part of many applications. Policies are often used to control access to sensitive information. Current policy specification languages give users ...
Kevin Borders, Xin Zhao, Atul Prakash
MABS
2004
Springer
14 years 2 months ago
A Hybrid Micro-Simulator for Determining the Effects of Governmental Control Policies on Transport Chains
Abstract. A simulation-based tool is described which will be used to investigate how the actors in a transport chain are expected to act when different types of governmental contro...
Markus Bergkvist, Paul Davidsson, Jan A. Persson, ...
SACMAT
2009
ACM
14 years 3 months ago
An algebra for fine-grained integration of XACML policies
Collaborative and distributed applications, such as dynamic coalitions and virtualized grid computing, often require integrating access control policies of collaborating parties. ...
Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, ...
CDC
2010
IEEE
135views Control Systems» more  CDC 2010»
13 years 3 months ago
A simple optimal power flow model with energy storage
The integration of renewable energy generation, such as wind power, into the electric grid is difficult because of the source intermittency and the large distance between generatio...
K. Mani Chandy, Steven H. Low, Ufuk Topcu, Huan Xu
SP
1996
IEEE
121views Security Privacy» more  SP 1996»
14 years 1 months ago
A Security Policy Model for Clinical Information Systems
The protection of personal health information has become a live issue in a number of countries including the USA, Canada, Britain and Germany. The debate has shown that there is w...
Ross J. Anderson