Sciweavers

769 search results - page 69 / 154
» Policy Storage for Role-Based Access Control Systems
Sort
View
CONCUR
2004
Springer
14 years 2 months ago
Type Based Discretionary Access Control
Abstract. Discretionary Access Control (DAC) systems provide powerful mechanisms for resource management based on the selective distribution of capabilities to selected classes of ...
Michele Bugliesi, Dario Colazzo, Silvia Crafa
CDC
2009
IEEE
113views Control Systems» more  CDC 2009»
14 years 27 days ago
A switched system approach to scheduling of networked control systems with communication constraints
This paper presents a scheduling strategy for a collection of discrete-time networked control systems (NCSs) subjected to communication constraints. Communication constraints under...
Shi-Lu Dai, Hai Lin, Shuzhi Sam Ge
SACMAT
2010
ACM
13 years 7 months ago
An architecture for enforcing end-to-end access control over web applications
The web is now being used as a general platform for hosting distributed applications like wikis, bulletin board messaging systems and collaborative editing environments. Data from...
Boniface Hicks, Sandra Rueda, Dave King 0002, Thom...
ICN
2005
Springer
14 years 2 months ago
MiSC: A New Availability Remote Storage System for Mobile Appliance
Abstract. The continued growth of both mobile appliances and wireless Internet technologies is bringing a new telecommunication revolution and has extended the demand of various se...
Joo-Ho Kim, Bo-Seok Moon, Myong-Soon Park
NDSS
2003
IEEE
14 years 2 months ago
Access Control Based on Execution History
Security is a major, frequent concern in extensible software systems such as Java Virtual Machines and the Common Language Runtime. These systems aim to enable simple, classic app...
Martín Abadi, Cédric Fournet