Sciweavers

1150 search results - page 47 / 230
» Specifying Information-Flow Controls
Sort
View
FASE
2004
Springer
14 years 2 months ago
Modeling Role-Based Access Control Using Parameterized UML Models
Abstract. Organizations use Role-Based Access Control (RBAC) to protect computer-based resources from unauthorized access. There has been considerable work on formally specifying R...
Dae-Kyoo Kim, Indrakshi Ray, Robert B. France, Na ...
VTS
2002
IEEE
109views Hardware» more  VTS 2002»
14 years 2 months ago
Controlling Peak Power During Scan Testing
This paper presents a procedure for modifying a given set of scan vectors so that the peak power during scan testing is kept below a specified limit without reducing fault coverag...
Ranganathan Sankaralingam, Nur A. Touba
ACSAC
2000
IEEE
14 years 1 months ago
A Flexible Access Control Service for Java Mobile Code
Mobile Code (MC) technologies provide appealing solutionsfor the development of Internet applications.For instance, Java technologyfacilitates dynamic loading of application code ...
Antonio Corradi, Rebecca Montanari, Cesare Stefane...
CSFW
2010
IEEE
14 years 1 months ago
Constraining Credential Usage in Logic-Based Access Control
—Authorization logics allow concise specification of flexible access-control policies, and are the basis for logic-based access-control systems. In such systems, resource owner...
Lujo Bauer, Limin Jia, Divya Sharma
TLT
2008
149views more  TLT 2008»
13 years 9 months ago
Control Your eLearning Environment: Exploiting Policies in an Open Infrastructure for Lifelong Learning
Abstract-- Nowadays, people are in need for continuous learning in order to keep up to date or to be upgraded in their job. An infrastructure for life-long learning requires contin...
Juri Luca De Coi, Philipp Kärger, Arne Wolf K...