Sciweavers

2838 search results - page 8 / 568
» Verifying Controlled Components
Sort
View
JCS
2008
119views more  JCS 2008»
13 years 8 months ago
Synthesising verified access control systems through model checking
We present a framework for evaluating and generating access control policies. The framework contains a modelling formalism called RW, which is supported by a model checking tool. ...
Nan Zhang 0003, Mark Ryan, Dimitar P. Guelev
CSFW
2006
IEEE
14 years 2 months ago
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies
There is a growing interest in establishing rules to regulate the privacy of citizens in the treatment of sensitive personal data such as medical and financial records. Such rule...
Michael J. May, Carl A. Gunter, Insup Lee
GW
2005
Springer
119views Biometrics» more  GW 2005»
14 years 2 months ago
Dynamic Control of Captured Motions to Verify New Constraints
Simulating realistic human-like figures is still a challenging task when dynamics is involved. For example, making a virtual human jump to a given position requires to control the...
Carole Durocher, Franck Multon, Richard Kulpa
JCS
2010
124views more  JCS 2010»
13 years 7 months ago
Verifying resource access control on mobile interactive devices
A model of resource access control is presented in which the access control to resources can employ user interaction to obtain the necessary permissions. This model is inspired by...
Frédéric Besson, Guillaume Dufay, Th...
CCS
2004
ACM
14 years 16 days ago
Synthesising verified access control systems in XACML
Nan Zhang 0003, Mark Ryan, Dimitar P. Guelev