Sciweavers

1150 search results - page 54 / 230
» Specifying Information-Flow Controls
Sort
View
ICISS
2005
Springer
14 years 2 months ago
Protection of Relationships in XML Documents with the XML-BB Model
Since XML tends to become the main format to exchange data over the Internet, it is necessary to deļ¬ne a security model to control the access to the content of these documents. S...
Frédéric Cuppens, Nora Cuppens-Boula...
VTS
1996
IEEE
76views Hardware» more  VTS 1996»
14 years 1 months ago
Test point insertion based on path tracing
This paper presents an innovative method for inserting test points in the circuit-under-test to obtain complete fault coverage for a specified set of test patterns. Rather than us...
Nur A. Touba, Edward J. McCluskey
GRAPHICSINTERFACE
1996
13 years 10 months ago
Topological Evolution of Surfaces
This paper presents a framework for generating smoothlooking transformations between pairs of surfaces that may differ in topology. The user controls the transformation by specify...
Douglas DeCarlo, Jean H. Gallier
SACMAT
2003
ACM
14 years 2 months ago
Dependencies and separation of duty constraints in GTRBAC
A Generalized Temporal Role Based Access Control (GTRBAC) model that captures an exhaustive set of temporal constraint needs for access control has recently been proposed. GTRBACā...
James Joshi, Basit Shafiq, Arif Ghafoor, Elisa Ber...
HICSS
2009
IEEE
97views Biometrics» more  HICSS 2009»
14 years 4 months ago
Selecting Web Services and Participants for Enforcing Workflow Access Control
Web services have emerged as a de facto standard for encapsulating services within or across organization boundaries. Various proposals have been made to compose Web services into...
San-Yih Hwang, Chuan Yin, Chien-Hsiang Lee