نتایج جستجو برای: access control

تعداد نتایج: 1607635  

Journal: :I. J. Network Security 2007
Cungang Yang

In the secure domain computing environments, it is important to keep resources and information integrity from unauthorized access. Therefore, there is a strong demand on the access control for shared resources. In the past few years, Role-based Access Control (RBAC) has been introduced and offered a powerful means of specifying access control decisions. In this paper, an Object Oriented RBAC mo...

1998
Victoria Ungureanu Naftaly H. Minsky

Modern distributed systems tend to be conglomerates of heterogeneous subsystems, which have been designed separately, by di erent people, with little, if any, knowledge of each other | and which may be governed by di erent security policies. A single software agent operating within such a system may nd itself interacting with, or even belonging to, several subsystems, and thus be subject to sev...

2005
Keiichi Hori Keizo Mizuno

This paper examines the effect of open access policy on competition in network industries under uncertainty. Comparing a competition under an open access policy with a facility-based competition, we confirm that allowing access to an essential facility makes the timing of a follower’s entry earlier than that in a facility-based competition, irrespective of the level of access charge. Furthermor...

2006
Karol Matiaško Katarína Zábovská Michal Zábovský

In this paper we are introducing the concept for the unified data access framework. The main aim of our work is to allow the unified data access on the international level for educational, commercial and security purposes. The idea of the unified access is important in the current days mostly for the national/international security, international labor policy, market restrictions or diseases pr...

2011
Karol MATIAŠKO Katarína ZÁBOVSKÁ Michal ZÁBOVSKÝ

In this paper we are introducing the concept for the unified data access framework. The main aim of our work is to allow the unified data access on the international level for educational, commercial and security purposes. The idea of the unified access is important in the current days mostly for the national/international security, international labor policy, market restrictions or diseases pr...

2007
Mahesh V. Tripunitara Ninghui Li

We present a theory for comparing the expressive power of access control models. The theory is based on simulations that preserve security properties. We perceive access control systems as state-transition systems and present two kinds of simulations, reductions and state-matching reductions. In applying the theory, we highlight four new results and discuss these results in the context of other...

Journal: :J. UCS 2009
Jörg R. Mühlbacher Christian Praher

Besides the well established access control models, Discretionary Access Control (DAC) and Mandatory Access Control (MAC), the policy neutral Role Based Access Control (RBAC) is gaining increasing attention. An important step towards a wide acceptance of RBAC has been achieved by the standardization of RBAC through the American National Standards Institute (ANSI). While the mandatory concept of...

Journal: :Acta Informatica Pragensia 2015

Journal: :Theoretical Computer Science 2000

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید