Sciweavers

807 search results - page 8 / 162
» Term Rewriting for Access Control
Sort
View
FROCOS
2005
Springer
14 years 27 days ago
Proving Liveness with Fairness Using Rewriting
Abstract. In this paper we combine rewriting techniques with verification issues. More precisely, we show how techniques for proving relative termination of term rewrite systems (...
Adam Koprowski, Hans Zantema
SP
1998
IEEE
106views Security Privacy» more  SP 1998»
13 years 11 months ago
Understanding Java Stack Inspection
Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
Dan S. Wallach, Edward W. Felten
CSFW
2003
IEEE
14 years 20 days ago
Understanding SPKI/SDSI Using First-Order Logic
SPKI/SDSI is a language for expressing distributed access control policy, derived from SPKI and SDSI. We provide a first-order logic (FOL) semantics for SDSI, and show that it ha...
Ninghui Li, John C. Mitchell
ICC
2007
IEEE
14 years 1 months ago
Satisfying Elastic Short Term Fairness in High Throughput Wireless Communication Systems with Multimedia Services
Abstract—In this paper we study the problem of providing shortterm access time fairness in wireless communication systems with multimedia services, while still maintaining high s...
Timotheos Kastrinogiannis, Symeon Papavassiliou
RULEML
2007
Springer
14 years 1 months ago
Specifying Process-Aware Access Control Rules in SBVR
Abstract. Access control is an important aspect of regulatory compliance. Therefore, access control specifications must be process-aware in that they can refer to an underlying bu...
Stijn Goedertier, Christophe Mues, Jan Vanthienen