Sciweavers

116 search results - page 11 / 24
» RiBAC: Role Interaction Based Access Control Model for Commu...
Sort
View
159
Voted
CSFW
2012
IEEE
13 years 6 months ago
Gran: Model Checking Grsecurity RBAC Policies
—Role-based Access Control (RBAC) is one of the most widespread security mechanisms in use today. Given the growing complexity of policy languages and access control systems, ver...
Michele Bugliesi, Stefano Calzavara, Riccardo Foca...
107
Voted
BMCBI
2010
92views more  BMCBI 2010»
15 years 3 months ago
HORI: a web server to compute Higher Order Residue Interactions in protein structures
Background: Folding of a protein into its three dimensional structure is influenced by both local and global interactions within a protein. Higher order residue interactions, like...
Pandurangan Sundaramurthy, Khader Shameer, Raashi ...
130
Voted
CSFW
2004
IEEE
15 years 7 months ago
The Consistency of Task-Based Authorization Constraints in Workflow Systems
Workflow management systems (WFMSs) have attracted a lot of interest both in academia and the business community. A workflow consists of a collection of tasks that are organized t...
Kaijun Tan, Jason Crampton, Carl A. Gunter
145
Voted
CCS
2005
ACM
15 years 9 months ago
A framework for concrete reputation-systems with applications to history-based access control
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions...
Karl Krukow, Mogens Nielsen, Vladimiro Sassone
123
Voted
SMC
2007
IEEE
143views Control Systems» more  SMC 2007»
15 years 9 months ago
Enabling gestural interaction by means of tracking dynamical systems models and assistive feedback
— The computational understanding of continuous human movement plays a significant role in diverse emergent applications in areas ranging from human computer interaction to phys...
Yon Visell, Jeremy R. Cooperstock