Sciweavers

580 search results - page 38 / 116
» The Interaction of Access Control and Object-Orientation in ...
Sort
View
SRDS
2005
IEEE
14 years 2 months ago
Enforcing Enterprise-wide Policies Over Standard Client-Server Interactions
We propose and evaluate a novel framework for enforcing global coordination and control policies over interacting software components in enterprise computing environments. This fra...
Zhijun He, Tuan Phan, Thu D. Nguyen
HT
1996
ACM
14 years 27 days ago
The HyperDisco Approach to Open Hypermedia Systems
Computing support forlargeengineeringenterprisesprovides an example of the need for hypermedia-based collaborative computing systems composed of a large number of distributed hete...
Uffe Kock Wiil, John J. Leggett
CN
2006
111views more  CN 2006»
13 years 8 months ago
Analytical modeling of CAC in next generation wireless systems
Though Connection Admission Control (CAC) in wireless networks has been studied extensively, the heterogeneous structure of Next Generation Wireless Systems (NGWS) makes CAC very ...
Tuna Tugcu, H. Birkan Yilmaz, Feodor S. Vainstein
ACSAC
2001
IEEE
14 years 12 days ago
Detecting Conflicts in a Role-Based Delegation Model
The RBAC96 access control model has been the basis for extensive work on role-based constraint specification and role-based delegation. However, these practical extensions can als...
Andreas Schaad
CCS
2010
ACM
13 years 9 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...