Sciweavers

807 search results - page 57 / 162
» Term Rewriting for Access Control
Sort
View
SACMAT
2010
ACM
15 years 8 months ago
Role updating for assignments
The role-based access control (RBAC) has significantly simplified the management of users and permissions in computing systems. In dynamic environments, systems are usually unde...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
100
Voted
CSCW
1996
ACM
15 years 7 months ago
Policies and Roles in Collaborative Applications
Collaborative systems provide a rich but potentially chaotic environment for their users. This paper presents a system that allows users to control collaboration by enacting polic...
W. Keith Edwards
124
Voted
WORDS
2005
IEEE
15 years 9 months ago
An RBAC Framework for Time Constrained Secure Interoperation in Multi-domain Environments
In emerging e-commerce applications, time constrained information sharing between different systems is becoming a common phenomenon. A flexible and efficient mechanism is needed t...
Smithi Piromruen, James B. D. Joshi
119
Voted
PASTE
2005
ACM
15 years 9 months ago
LANCET: a nifty code editing tool
This paper presents Lancet, a multi-platform software visualization tool that enables the inspection of programs at the binary code level. Implemented on top of the linktime rewri...
Ludo Van Put, Bjorn De Sutter, Matias Madou, Bruno...
123
Voted
FSEN
2009
Springer
15 years 7 months ago
Executable Interface Specifications for Testing Asynchronous Creol Components
We propose and explore a formal approach for black-box testing asynchronously communicating components in open environments. Asynchronicity poses a challenge for validating and tes...
Immo Grabe, Marcel Kyas, Martin Steffen, Arild B. ...