Sciweavers

315 search results - page 44 / 63
» Supporting location-based conditions in access control polic...
Sort
View
SACMAT
2009
ACM
14 years 3 months ago
Towards formal security analysis of GTRBAC using timed automata
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri
INFOCOM
2007
IEEE
14 years 2 months ago
Two-Tier Load Balancing in OSPF Wireless Back-Hauls
Abstract— High-speed wireless communication technology (e.g. WiMAX) makes it feasible and cost-effective to build wireless back-hauls for Internet access. Compared to wired count...
Xiaowen Zhang, Hao Zhu
TMM
2002
133views more  TMM 2002»
13 years 8 months ago
A model for secure multimedia document database system in a distributed environment
Abstract--The Internet provides a universal platform for largescale distribution of information and supports inter-organizational services, system integration, and collaboration. U...
James B. D. Joshi, Zhaohui Kevin Li, Husni Fahmi, ...
FASE
2008
Springer
13 years 10 months ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu
WWW
2010
ACM
14 years 3 months ago
Object views: fine-grained sharing in browsers
Browsers do not currently support the secure sharing of JavaScript objects between principals. We present this problem as the need for object views, which are consistent and contr...
Leo A. Meyerovich, Adrienne Porter Felt, Mark S. M...