Sciweavers

1147 search results - page 45 / 230
» Transformation of Access Rights
Sort
View
JHSN
2006
100views more  JHSN 2006»
13 years 8 months ago
Reconfiguring Role Based Access Control policies using risk semantics
We present a refined model for Role Based Access Control policies and define a risk measure for the model, which expresses elements of the operational, combinatorial and conflict ...
Benjamin Aziz, Simon N. Foley, John Herbert, Garre...
ACSAC
2009
IEEE
14 years 21 days ago
A Network Access Control Mechanism Based on Behavior Profiles
Abstract--Current Network Access Control (NAC) technologies manage the access of new devices into a network to prevent rogue devices from attacking network hosts or services. Typic...
Vanessa Frías-Martínez, Joseph Sherr...
XMLSEC
2003
ACM
14 years 1 months ago
Access control of XML documents considering update operations
As a large quantity of information is presented in XML format on the Web, there are increasing demands for XML security. Until now, research on XML security has been focused on th...
Chung-Hwan Lim, Seog Park, Sang Hyuk Son
ACL
2008
13 years 10 months ago
A Unified Syntactic Model for Parsing Fluent and Disfluent Speech
This paper describes a syntactic representation for modeling speech repairs. This representation makes use of a right corner transform of syntax trees to produce a tree representa...
Tim Miller, William Schuler
APPML
2007
79views more  APPML 2007»
13 years 8 months ago
Marr-type wavelets of high vanishing moments
In this work, kinds of Marr-type wavelets Ψn(t) are obtained and an explicit expression for the wavelets is derived. Time–frequency analysis shows that, regarded as window func...
Jieqing Tan, Ping Jiang