Sciweavers

1150 search results - page 92 / 230
» Specifying Information-Flow Controls
Sort
View
CCS
2006
ACM
14 years 2 days ago
Safety analysis of usage control authorization models
The usage control (UCON) model was introduced as a unified approach to capture a number of extensions for traditional access control models. While the policy specification flexibi...
Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Pre...
TROB
2002
169views more  TROB 2002»
13 years 8 months ago
Constructing reconfigurable software for machine control systems
Reconfigurable software is highly desired for automated machine tool control systems for low-cost products and short time to market. In this paper, we propose a software architectu...
Shige Wang, Kang G. Shin
COMPSAC
2010
IEEE
13 years 6 months ago
Representing and Reasoning about Web Access Control Policies
The advent of emerging technologies such as Web services, service-oriented architecture, and cloud computing has enabled us to perform business services more efficiently and effect...
Gail-Joon Ahn, Hongxin Hu, Joohyung Lee, Yunsong M...
POLICY
2009
Springer
14 years 2 months ago
The Zodiac Policy Subsystem: A Policy-Based Management System for a High-Security MANET
Abstract—Zodiac (Zero Outage Dynamic Intrinsically Assurable Communities) is an implementation of a high-security MANET, resistant to multiple types of attacks, including Byzanti...
Yuu-Heng Cheng, Mariana Raykova, Alexander Poylish...
SASO
2008
IEEE
14 years 2 months ago
Spatial Computing with Labels
— A reconfigurable robot is a robot that can change shape. Programming reconfigurable robots is complicated by the need to adapt the behavior of each of the individual module t...
Ulrik Pagh Schultz, Mirko Bordignon, David Johan C...