Sciweavers

1150 search results - page 92 / 230
» Specifying Information-Flow Controls
Sort
View
118
Voted
CCS
2006
ACM
15 years 6 months ago
Safety analysis of usage control authorization models
The usage control (UCON) model was introduced as a unified approach to capture a number of extensions for traditional access control models. While the policy specification flexibi...
Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Pre...
121
Voted
TROB
2002
169views more  TROB 2002»
15 years 2 months ago
Constructing reconfigurable software for machine control systems
Reconfigurable software is highly desired for automated machine tool control systems for low-cost products and short time to market. In this paper, we propose a software architectu...
Shige Wang, Kang G. Shin
152
Voted
COMPSAC
2010
IEEE
15 years 18 days ago
Representing and Reasoning about Web Access Control Policies
The advent of emerging technologies such as Web services, service-oriented architecture, and cloud computing has enabled us to perform business services more efficiently and effect...
Gail-Joon Ahn, Hongxin Hu, Joohyung Lee, Yunsong M...
125
Voted
POLICY
2009
Springer
15 years 9 months ago
The Zodiac Policy Subsystem: A Policy-Based Management System for a High-Security MANET
Abstract—Zodiac (Zero Outage Dynamic Intrinsically Assurable Communities) is an implementation of a high-security MANET, resistant to multiple types of attacks, including Byzanti...
Yuu-Heng Cheng, Mariana Raykova, Alexander Poylish...
138
Voted
SASO
2008
IEEE
15 years 9 months ago
Spatial Computing with Labels
— A reconfigurable robot is a robot that can change shape. Programming reconfigurable robots is complicated by the need to adapt the behavior of each of the individual module t...
Ulrik Pagh Schultz, Mirko Bordignon, David Johan C...