Sciweavers

316 search results - page 29 / 64
» Variations in Access Control Logic
Sort
View
TISSEC
2010
142views more  TISSEC 2010»
13 years 2 months ago
A logical specification and analysis for SELinux MLS policy
The SELinux mandatory access control (MAC) policy has recently added a multi-level security (MLS) model which is able to express a fine granularity of control over a subject'...
Boniface Hicks, Sandra Rueda, Luke St. Clair, Tren...
DLOG
2010
13 years 5 months ago
The Logical Difference For Fuzzy EL+ Ontologies
Abstract. Ontologies undergo changes for reasons such as changes in knowledge, meeting varying application requirements. Thus, for different versions of a considered ontology, it i...
Shasha Feng, Yonggang Zhang, Dantong Ouyang, Haiya...
CCS
2010
ACM
14 years 2 months ago
A logic for authorization provenance
In distributed environments, statements from a number of principals, besides the central trusted party, may influence the derivations of authorization decisions. However, existin...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
IAJIT
2010
84views more  IAJIT 2010»
13 years 6 months ago
A Test Procedure for Boundary Scan Circuitry in PLDs and FPGAs
: A test procedure for testing mainly the boundary scan cells, and testing partially the test access port controller in programmable logic devices, and field programmable gate arra...
Bashar Al-Khalifa
ACSAC
2001
IEEE
13 years 11 months ago
The Authorization Service of Tivoli Policy Director
This paper presents the Authorization Service provided by Tivoli Policy Director (PD) and its use by PD family members as well as third-party applications. Policies are defined ov...
Günter Karjoth