Sciweavers

1082 search results - page 34 / 217
» Policy support for call control
Sort
View
ISW
2009
Springer
14 years 3 months ago
Hardware-Assisted Application-Level Access Control
Abstract. Applications typically rely on the operating system to enforce access control policies such as MAC, DAC, or other policies. However, in the face of a compromised operatin...
Yu-Yuan Chen, Ruby B. Lee
CSFW
2012
IEEE
11 years 11 months ago
Gran: Model Checking Grsecurity RBAC Policies
—Role-based Access Control (RBAC) is one of the most widespread security mechanisms in use today. Given the growing complexity of policy languages and access control systems, ver...
Michele Bugliesi, Stefano Calzavara, Riccardo Foca...
GLOBECOM
2008
IEEE
14 years 3 months ago
Joint Scheduling and Rate Control Algorithms for Stable Throughput Maximization under Channel Estimation in Single-Hop Wireless
—We characterize the stability region of wireless, single-hop networks with time-varying imperfect channels. We define a joint scheduling and transmission rate control policy th...
Anna Pantelidou, Anthony Ephremides
SDMW
2009
Springer
14 years 3 months ago
An Access Control Language for a General Provenance Model
Provenance access control has been recognized as one of the most important components in an enterprise-level provenance system. However, it has only received little attention in th...
Qun Ni, Shouhuai Xu, Elisa Bertino, Ravi S. Sandhu...
TISSEC
2010
142views more  TISSEC 2010»
13 years 3 months ago
A logical specification and analysis for SELinux MLS policy
The SELinux mandatory access control (MAC) policy has recently added a multi-level security (MLS) model which is able to express a fine granularity of control over a subject'...
Boniface Hicks, Sandra Rueda, Luke St. Clair, Tren...