Sciweavers

2838 search results - page 130 / 568
» Verifying Controlled Components
Sort
View
XMLSEC
2003
ACM
14 years 3 months ago
First experiences using XACML for access control in distributed systems
Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as com...
Markus Lorch, Seth Proctor, Rebekah Lepro, Dennis ...
EDBT
2008
ACM
142views Database» more  EDBT 2008»
14 years 10 months ago
An access control mechanism for P2P collaborations
We introduce a fine grained access control mechanism for Peer-to-Peer collaborations. It is based on the local access control components of the participants. The peers export thei...
Christoph Sturm, Klaus R. Dittrich, Patrick Ziegle...
SDMW
2009
Springer
14 years 4 months ago
An Access Control Language for a General Provenance Model
Provenance access control has been recognized as one of the most important components in an enterprise-level provenance system. However, it has only received little attention in th...
Qun Ni, Shouhuai Xu, Elisa Bertino, Ravi S. Sandhu...
KI
2007
Springer
14 years 4 months ago
The Behaviour-Based Control Architecture iB2C for Complex Robotic Systems
This paper presents the behaviour-based control architecture iB2C (integrated Behaviour-Based Control) used for the development of complex robotic systems. The specification of be...
Martin Proetzsch, Tobias Luksch, Karsten Berns
RTSS
1990
IEEE
14 years 2 months ago
Concurrency Control in Real-Time Databases by Dynamic Adjustment of Serialization Order
Time-critical scheduling in real-time database systems has two components: real-time transaction scheduling,which is related to task scheduling in realtime operating systems, and ...
Yi Lin, Sang Hyuk Son