Sciweavers

127 search results - page 10 / 26
» Towards reasonability properties for access-control policy l...
Sort
View
ESOP
2010
Springer
14 years 5 months ago
Precise and Automated Contract-based Reasoning for Verification and Certification of Information Flow Properties of Programs wit
Abstract. Embedded information assurance applications that are critical to national and international infrastructures, must often adhere to certification regimes that require infor...
Torben Amtoft, John Hatcliff and Edwin Rodríguez
CP
2003
Springer
14 years 25 days ago
Ten Challenges Redux: Recent Progress in Propositional Reasoning and Search
Abstract. In 1997 we presented ten challenges for research on satisfiability testing [1]. In this paper we review recent progress towards each of these challenges, including our o...
Henry A. Kautz, Bart Selman
SAC
2005
ACM
14 years 1 months ago
An attribute-based access matrix model
In traditional access control models like MAC, DAC, and RBAC, authorization decisions are determined according to identities of subjects and objects, which are authenticated by a ...
Xinwen Zhang, Yingjiu Li, Divya Nalla
SISW
2005
IEEE
14 years 1 months ago
Towards Protecting Sensitive Files in a Compromised System
Protecting sensitive files from a compromised system helps administrator to thwart many attacks, discover intrusion trails, and fast restore the system to a safe state. However, ...
Xin Zhao, Kevin Borders, Atul Prakash
ATAL
2005
Springer
14 years 1 months ago
An organisation infrastructure for Multi-Agent Systems based on Agent Coordination Contexts
We present an organisation infrastructure for open MultiAgent Systems built upon a role-based access control model (RBAC), which provides agents with means to enable and control a...
Mirko Viroli, Alessandro Ricci, Andrea Omicini