نتایج جستجو برای: Access Control Policy (ACP)

تعداد نتایج: 1825945  

Journal: :Information & Software Technology 2009
Qingfeng He Annie I. Antón

Access control is a mechanism for achieving confidentiality and integrity in software systems. Access control policies (ACPs) are security requirements that define how access is managed and the high-level rules of who, under what conditions, can access what information. Traditionally, access control policies are often specified after a system is designed and deployed. Because ACP specification ...

The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications ...

2008
F. Yu

The authors thank the referee for the constructive and helpful comments. Our detailed replies to the referee 2’s comments (in Italic) are given below. Anonymous Referee 2 This manuscript discusses an important topic, the contribution of ion-induced nucleation on atmospheric new particle formation. It is well-written, and in its current form, discreet, compared to the original manuscript. It is ...

Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access control in the composition of web services a complicated problem. In this paper, a new indepe...

2005
Qingfeng He Juanli Guo

HE, QINGFENG. Requirements-Based Access Control Analysis and Policy Specification. (Under the direction of Dr. Ana (Annie) I. Antón.) Access control is a mechanism for achieving confidentiality and integrity in software systems. Access control policies (ACPs) define how access is managed and the high-level rules of who can access what information under certain conditions. Traditionally, access ...

2005
Qingfeng He

HE, QINGFENG. Requirements-Based Access Control Analysis and Policy Specification. (Under the direction of Dr. Ana (Annie) I. Antón.) Access control is a mechanism for achieving confidentiality and integrity in software systems. Access control policies (ACPs) define how access is managed and the high-level rules of who can access what information under certain conditions. Traditionally, access ...

2009
A. M. Makarieva

As detailed below, we respect the work of Dr. Makarieva and co-authors (Makarieva et al., 2008), but we have come to similar conclusions as Dr. Haynes and decided not to accept the manuscript for final publication in ACP. The decision is supported by the entire ACP executive committee, but for clarity and simplicity the following editorial report is formulated from my perspective as the chief-e...

2003
Iuon-Chang Lin Min-Shiang Hwang Chin-Chen Chang

11 In a traditional key assignment scheme, an access control policy is used to solve the access control problem in a hierarchy. A higher security class can access lower security classes, but the opposite is not allowed. However, in some cases, this can be troublesome because of the lack of flexibility. In this paper, we shall propose a secure key assignment scheme which can be performed not onl...

2005
Michael Carl Tschantz Michael M. Greenberg Casey Marks

Languages for the specification of access-control policies should support language features that allow for policies to be written in a clear manner. This work presents a set of language features found in current access-control languages and formalizes a set of intuitive properties the author believes to be relevant to policy clarity. The author analyzes access-control languages with respect to ...

2016
David Ferraiolo Larry Feldman Greg Witte

As more and more information becomes centralized, controlling and managing access to sensitive data becomes increasingly challenging. Attribute-based access control (ABAC), which represents the latest milestone in the evolution of logical access control methods, is designed to address these challenges. It provides an attribute-based approach to accommodate a wide breadth of access control polic...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید