Sciweavers

1150 search results - page 68 / 230
» Specifying Information-Flow Controls
Sort
View
118
Voted
CAISE
2010
Springer
15 years 2 months ago
Dynamic Authorisation Policies for Event-Based Task Delegation
Task delegation presents one of the business process security leitmotifs. It defines a mechanism that bridges the gap between both workflow and access control systems. There are tw...
Khaled Gaaloul, Ehtesham Zahoor, François C...
99
Voted
SACMAT
2006
ACM
15 years 8 months ago
Towards reasonability properties for access-control policy languages
The growing importance of access control has led to the definition of numerous languages for specifying policies. Since these languages are based on different foundations, langua...
Michael Carl Tschantz, Shriram Krishnamurthi
126
Voted
WETICE
1996
IEEE
15 years 6 months ago
Role-based security for distributed object systems
This paper describes a security architecture designed to support role-based access control for distributed object systems in a large-scale, multi-organisational enterprise in whic...
Nicholas Yialelis, Emil Lupu, Morris Sloman
124
Voted
IJCAI
2001
15 years 4 months ago
On-Line Execution of cc-Golog Plans
Previously, the plan language cc-Golog was introduced for the purpose of specifying event-driven behavior typically found in robot controllers. So far, however, cc-Golog is usable...
Henrik Grosskreutz, Gerhard Lakemeyer
123
Voted
RTSS
1999
IEEE
15 years 6 months ago
Specification and Analysis of Soft Real-Time Systems: Quantity and Quality
This paper presents a process algebra for specifying soft real-time constraints in a compositional way. For these soft constraints we take a stochastic point of view and allow arb...
Pedro R. D'Argenio, Joost-Pieter Katoen, Ed Brinks...