Sciweavers

3712 search results - page 196 / 743
» Role-Based Access Control
Sort
View
DBSEC
2004
83views Database» more  DBSEC 2004»
15 years 4 months ago
Attribute Mutability in Usage Control
The notion of Usage Control (UCON) has been introduced recently to extend traditional access controls by including three decision factors called authorizations, obligations, and co...
Jaehong Park, Xinwen Zhang, Ravi S. Sandhu
109
Voted
IPCCC
2007
IEEE
15 years 9 months ago
A Model-Based Admission Control for 802.11e EDCA using Delay Predictions
- This paper presents a unique approach for a model-based admission control algorithm for the IEEE 802.11e Enhanced Distributed Channel Access (EDCA) standard. The analytical model...
A. Bai, Tor Skeie, Paal E. Engelstad
118
Voted
SACMAT
2009
ACM
15 years 9 months ago
xDomain: cross-border proofs of access
A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy — a...
Lujo Bauer, Limin Jia, Michael K. Reiter, David Sw...
SP
2007
IEEE
113views Security Privacy» more  SP 2007»
15 years 9 months ago
Usable Mandatory Integrity Protection for Operating Systems
Existing mandatory access control systems for operating systems are difficult to use. We identify several principles for designing usable access control systems and introduce the...
Ninghui Li, Ziqing Mao, Hong Chen
136
Voted
DBSEC
2009
110views Database» more  DBSEC 2009»
15 years 3 months ago
Distributed Privilege Enforcement in PACS
Abstract. We present a new access control mechanism for P2P networks with distributed enforcement, called P2P Access Control System (PACS). PACS enforces powerful access control mo...
Christoph Sturm, Ela Hunt, Marc H. Scholl