Sciweavers

1082 search results - page 6 / 217
» Policy support for call control
Sort
View
CORR
2010
Springer
95views Education» more  CORR 2010»
13 years 7 months ago
Evaluating Call-By-Need on the Control Stack
Abstract. Ariola and Felleisen's call-by-need -calculus replaces a variable occurrence with its value at the last possible moment. To support this gradual notion of substituti...
Stephen Chang, David Van Horn, Matthias Felleisen
ISSTA
2006
ACM
14 years 1 months ago
Role-Based access control consistency validation
Modern enterprise systems support Role-Based Access Control (RBAC). Although RBAC allows restricting access to privileged operations, a deployer may actually intend to restrict ac...
Paolina Centonze, Gleb Naumovich, Stephen J. Fink,...
COOPIS
2002
IEEE
14 years 13 days ago
Regulating Work in Digital Enterprises: A Flexible Managerial Framework
This paper demonstrates that work in digital enterprises—like work in conventional enterprises— can be carried out effectively by autonomous agents, subject to a regulatory r...
Takahiro Murata, Naftaly H. Minsky
CCS
2006
ACM
13 years 11 months ago
Supporting location-based conditions in access control policies
Claudio Agostino Ardagna, Marco Cremonini, Ernesto...
ECOOP
1999
Springer
13 years 11 months ago
Providing Fine-grained Access Control for Java Programs
There is considerable interest in programs that can migrate from one host to another and execute. Mobile programs are appealing because they support efficient utilization of networ...
Raju Pandey, Brant Hashii