Sciweavers

3712 search results - page 188 / 743
» Role-Based Access Control
Sort
View
CDC
2009
IEEE
123views Control Systems» more  CDC 2009»
15 years 7 months ago
On the myopic policy for a class of restless bandit problems with applications in dynamic multichannel access
We consider a class of restless multi-armed bandit problems that arises in multi-channel opportunistic communications, where channels are modeled as independent and stochastically...
Keqin Liu, Qing Zhao
129
Voted
SMC
2010
IEEE
124views Control Systems» more  SMC 2010»
15 years 28 days ago
SoftFacts: A top-k retrieval engine for ontology mediated access to relational databases
—We outline SoftFacts, an ontology mediated top-k information retrieval system over relational databases. An ontology layer is used to define (in terms of a OWL-QL like Semantic...
Umberto Straccia
119
Voted
ICC
2007
IEEE
15 years 9 months ago
A Grammar for Specifying Usage Control Policies
—Usage control goes beyond traditional access control, addressing its limitations related to attribute mutability and continuous usage permission validation. The recently propose...
Rafael Teigao, Carlos Maziero, Altair Olivo Santin
ESORICS
2004
Springer
15 years 8 months ago
Security Property Based Administrative Controls
Abstract. Access control languages which support administrative controls, and thus allow the ordinary permissions of a system to change, have traditionally been constructed with ...
Jon A. Solworth, Robert H. Sloan
99
Voted
DBSEC
2007
87views Database» more  DBSEC 2007»
15 years 4 months ago
Towards a Times-Based Usage Control Model
Abstract. Modern information systems require temporal and privilegeconsuming usage of digital objects. To meet these requirements, we present a new access control model–Times-bas...
Baoxian Zhao, Ravi S. Sandhu, Xinwen Zhang, Xiaoli...