نتایج جستجو برای: access methods

تعداد نتایج: 2144363  

2008
Jason Crampton

Unix is an operating system that began development almost 40 years ago. It has a very simple mechanism for controlling access to protected resources based on the owner-group-world model. This simple model has not attracted much interest from the access control community. In this paper we argue that the Unix access control mechanism has some interesting features of relevance to modern authorizat...

Journal: :Future Generation Comp. Syst. 2010
Fabio Martinelli Paolo Mori

This paper introduces a formal model, an architecture and a prototype implementation for usage control on GRID systems. The usage control model (UCON) is a new access control paradigm proposed by Park and Sandhu that encompasses and extends several existing models (e.g. MAC, DAC, Bell-Lapadula, RBAC, etc). Its main novelty is based on continuity of the access monitoring and mutability of attrib...

Journal: :IEEE Communications Surveys & Tutorials 2010

Journal: :International Journal of Advanced Computer Science and Applications 2012

Journal: :IEEE Transactions on Cognitive Communications and Networking 2017

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید