Sciweavers

837 search results - page 29 / 168
» Rewriting-Based Access Control Policies
Sort
View
ACSAC
2000
IEEE
13 years 12 months ago
A Policy-based Access Control Mechanism for the Corporate Web
Current Web technologies use access control lists (ACLs) for enforcing regulations and practices governing businesses today. Having the policy hard-coded into ACLs causes manageme...
Victoria Ungureanu, F. Vesuna, Naftaly H. Minsky
POLICY
2007
Springer
14 years 1 months ago
XACML Function Annotations
XACML is being increasingly adopted in large enterprise systems for specifying access control policies. However, the efficient analysis and integration of multiple policies in suc...
Prathima Rao, Dan Lin, Elisa Bertino
SAMOS
2009
Springer
14 years 1 months ago
Prediction in Dynamic SDRAM Controller Policies
Abstract. Memory access latency can limit microcontroller system performance. SDRAM access control policies impact latency through SDRAM device state. It is shown that execution ti...
Ying Xu, Aabhas S. Agarwal, Brian T. Davis
EDBT
2008
ACM
137views Database» more  EDBT 2008»
14 years 7 months ago
ACCOn: checking consistency of XML write-access control policies
XML access control policies involving updates may contain security flaws, here called inconsistencies, in which a forbidden operation may be simulated by performing a sequence of ...
Loreto Bravo, James Cheney, Irini Fundulaki
DBSEC
2008
107views Database» more  DBSEC 2008»
13 years 8 months ago
Regulating Exceptions in Healthcare Using Policy Spaces
One truth holds for the healthcare industry - nothing should interfere with the delivery of care. Given this fact, the access control mechanisms used in healthcare to regulate and ...
Claudio Agostino Ardagna, Sabrina De Capitani di V...