Sciweavers

124 search results - page 18 / 25
» Synthesising verified access control systems in XACML
Sort
View
SACMAT
2009
ACM
14 years 4 months ago
Towards formal security analysis of GTRBAC using timed automata
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri
SPW
2005
Springer
14 years 3 months ago
Countering Automated Exploits with System Security CAPTCHAS
Abstract. Many users routinely log in to their system with system administrator privileges. This is especially true of home users. The advantage of this setup is that these users c...
Dinan Gunawardena, Jacob Scott, Alf Zugenmaier, Au...
POPL
2000
ACM
14 years 2 months ago
A Type System for Expressive Security Policies
Certified code is a general mechanism for enforcing security properties. In this paradigm, untrusted mobile code carries annotations that allow a host to verify its trustworthine...
David Walker
ICRA
2007
IEEE
154views Robotics» more  ICRA 2007»
14 years 4 months ago
Identification of the payload inertial parameters of industrial manipulators
— In this paper we present four methods for the identification of the inertial parameters of the load of a manipulator. The knowledge of the values of these parameters can be use...
Wisama Khalil, Maxime Gautier, Philippe Lemoine
TISSEC
2010
142views more  TISSEC 2010»
13 years 4 months ago
A logical specification and analysis for SELinux MLS policy
The SELinux mandatory access control (MAC) policy has recently added a multi-level security (MLS) model which is able to express a fine granularity of control over a subject'...
Boniface Hicks, Sandra Rueda, Luke St. Clair, Tren...