Sciweavers

163 search results - page 14 / 33
» Specifying and enforcing constraints in role-based access co...
Sort
View
JCP
2006
106views more  JCP 2006»
13 years 7 months ago
Using Firewalls to Enforce Enterprise-wide Policies over Standard Client-Server Interactions
We propose and evaluate a novel framework for enforcing global coordination and control policies over message passing software components in enterprise computing environments. This...
Tuan Phan, Zhijun He, Thu D. Nguyen
CORR
2006
Springer
113views Education» more  CORR 2006»
13 years 7 months ago
Event Systems and Access Control
Abstract. We consider the interpretations of notions of access control (permissions, interdictions, obligations, and user rights) as run-time properties of information systems spec...
Dominique Méry, Stephan Merz
CDC
2010
IEEE
169views Control Systems» more  CDC 2010»
13 years 2 months ago
Control of a bicycle using virtual holonomic constraints
The problem of making a bicycle trace a strictly convex Jordan curve with bounded roll angle and bounded speed is investigated. The problem is solved by enforcing a virtual holonom...
Luca Consolini, Manfredi Maggiore
ACISP
2003
Springer
14 years 19 days ago
A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems
Abstract. This paper examines the access control requirements of distributed health care information networks. Since the electronic sharing of an individual’s personal health inf...
Jason Reid, Ian Cheong, Matthew Henricksen, Jason ...
JCS
2010
124views more  JCS 2010»
13 years 5 months ago
Verifying resource access control on mobile interactive devices
A model of resource access control is presented in which the access control to resources can employ user interaction to obtain the necessary permissions. This model is inspired by...
Frédéric Besson, Guillaume Dufay, Th...