نتایج جستجو برای: access control policies

تعداد نتایج: 1702974  

Journal: :JSW 2015
Jamal Abd-Ali Karim El Guemhioui Luigi Logrippo

Modelling is a proven technique to communicate and illustrate complex specifications in a wide range of disciplines. Access control (AC) specification is not an exception in this regard. Actually, it is characterized by the sensitivity and criticality of its contents where clarity and formalism are yet essential desired goals. In a metamodelling approach where textual languages and visual model...

Journal: :Data Knowl. Eng. 2004
Indrakshi Ray

Access control policies are security policies that govern access to resources. The need for real-time update of such policies while they are in effect and enforcing the changes immediately, arise in many scenarios. Consider, for example, a military environment responding to an international crisis, such as a war. In such situations, countries change strategies necessitating a change of policies...

2011
Amanda Crowell

Modern operating systems each have different implementations of access controls and use different policies for determining the access that subjects may have on objects. This paper reviews the three main types of access control policies: discretionary, mandatory, and role-based. It then describes how Windows and various Unix systems implement their chosen access control policies. Finally, it dis...

2003
Vijay G. Bharadwaj John S. Baras

We examine the problem of negotiating access control policies between autonomous domains. Our objective is to develop software agents that can automatically negotiate access control policies between autonomous domains with minimal human guidance. In this paper we show a mathematical framework that is capable of expressing many such negotiation problems, and illustrate its application to some pr...

2007
J. Bryans J. Fitzgerald Jeremy Bryans John Fitzgerald

Managing the evolution of a dynamic virtual organisation (VO) is a considerable challenge, particularly in ensuring that participating agents provide sufficient access to resources in order to achieve the overall goals without compromising their own information management principles. We propose a tool-supported approach, based on executable formal models, that supports rapid visualised feedback...

2007
Eunjee Song Indrakshi Ray Hanil Kim

From a software design perspective, access control policies are requirements that must be addressed in a design. For example, access control policies are constraints that determine the type of access authorized users have on information resources. In this paper, we show how one can formulate access control policies as a policy model, formulate an access control aspect model that enforces polici...

2006
Kathrin Lehmann Peter Thiemann

A field access analysis computes for each object the set of places where its fields are accessed and modified. Such an analysis is the formal basis for a code instrumentation algorithm that inserts access control checks in a program to enforce an access control policy. The present work formalizes field access analysis in terms of a typebased program analysis for Java, proves type preservation f...

Journal: :Journal of Information Security and Applications 2019

Journal: :Advances in Mathematics 2023

Role-Based Access Control (RBAC) has been widely used in information systems, including so-called critical systems. In business, workflows are to control the flow of processes. One major issues concerning these processes is be able verify that a proposed process model strictly corresponds specifications which it supposed respond. models describe frameworks dictate permissions. The RBAC generall...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید