• Aucun résultat trouvé

Access Control Model

A contextual privacy-aware access control model for network monitoring workflows: work in progress

A contextual privacy-aware access control model for network monitoring workflows: work in progress

... new access control model that aims at dealing with all those aforementioned ...associated access control provi- sions already at design-time, thus minimising run-time reasoning ...the ...

11

Reputation trust mechanism under the organizational-based access control model

Reputation trust mechanism under the organizational-based access control model

... of access control policies and the definition of trust ...mechanisms. Access control ontologies, as a structured way to represent real word elements, are widely employed for making the ...

17

A Social Semantic Web Access Control Model

A Social Semantic Web Access Control Model

... The Access Condition grants or restricts the access to the ...the access is granted to the ...the access is denied, we introduce the property hasCat- ...the access condition, and they ...

13

An Access Control Model Based Testing Approach for Smart Card Applications: Results of the {POSÉ} Project

An Access Control Model Based Testing Approach for Smart Card Applications: Results of the {POSÉ} Project

... rity model attached to such an application can be defined in terms of a specialization of the generic IAS security model or as an indepen- dent model that can be confronted to this generic ...

18

An Access Control Model for Web Databases

An Access Control Model for Web Databases

... 5.1 Policy 1 Under this policy, every command executed must match a profile. When the first command of the transaction is executed the tool searches for all the application profiles starting with that same command, which ...

9

Automatic Error Finding in Access-Control Policies

Automatic Error Finding in Access-Control Policies

... Protection Model (ESPM) [1] and the Typed Access Matrix model ...Dynamic-Typed Access Matrix ...discretionary access control model in which safety is de- ...new ...

14

Model-Based Tests for Access Control Policies

Model-Based Tests for Access Control Policies

... Name Figure 1 Semantics. The application of actions to resources is requested by a subject in a given context. Intuitively, for a request, the policy decision point checks if there is a rule that matches the request: the ...

11

G-Cloud on Openstack : Adressing access control and regulation requirements

G-Cloud on Openstack : Adressing access control and regulation requirements

... full control on employees’ ...Openstack access control model allows specifying several ...This model being an extension of RBAC, roles for managing employees already ...Openstack ...

7

Verifying Resource Access Control on Mobile Interactive Devices

Verifying Resource Access Control on Mobile Interactive Devices

... an access control model for programs which dynamically acquire permis- sions to access ...The model extends the current access control model of the Java MIDP ...

26

On Access Control, Capabilities, Their Equivalence, and Confused Deputy Attacks

On Access Control, Capabilities, Their Equivalence, and Confused Deputy Attacks

... to model capabilities and access control. They model two versions of capabilities, based on ...first model is capabilities as rows in the Lampson matrix and the second model is ...

15

Social Semantic Network-Based Access Control

Social Semantic Network-Based Access Control

... this model to grant access to users by considering not only their personal informa- tion, but also additional attributes, ...to model the user context in which the access request takes ...an ...

36

Context-aware access control and presentation of linked data

Context-aware access control and presentation of linked data

... of access control frameworks for Linked Data have been ...no access control model in literature has been designed to support full-fledged context aware ...

145

Model-Driven Integration and Analysis of Access-control Policies in Multi-layer Information Systems

Model-Driven Integration and Analysis of Access-control Policies in Multi-layer Information Systems

... an access control policy language and framework fulfilling these require- ...Attribute-based access-control model (ABAC)[7] what, along with its extensibility, provides to the language ...

15

The case for Access Control on XML relationships

The case for Access Control on XML relationships

... regulating access to XML documents has attracted a considerable attention from the database community in recent ...discretionary access control (DAC) models for XML [3,4,9,15] share the same ...

24

Context-Aware Access Control for RDF Graph Stores

Context-Aware Access Control for RDF Graph Stores

... on access control ...the access conditions and the use of Semantic Web languages ...press access control policies for RDF documents, while we provide an authorization mechanism for RDF ...

7

XPACML eXtensible Privacy Access Control Markup Language

XPACML eXtensible Privacy Access Control Markup Language

... In our approach, we adopted a policy based privacy manage- ment approach, and thus we naturally selected XACML as a language to express privacy aware access control policies. Our approach consists in ...

6

Session Types for Access and Information Flow Control

Session Types for Access and Information Flow Control

... Rapport de recherche n° 7368 — August 25, 2010 — 45 pages Abstract: We consider a calculus for multiparty sessions with delegation, enriched with security levels for session participants and data. We propose a type ...

49

Access control lists for the self-certifying filesystem

Access control lists for the self-certifying filesystem

... This thesis has demonstrated that the existing SFS infrastructure can be used to create a powerful, yet easy-to-use access control mechanism, which is well suited [r] ...

45

"Improving Network Access Control Integrity through Redundant Mechanisms"

"Improving Network Access Control Integrity through Redundant Mechanisms"

... Distributed Access Control The main difference between distributed access control mechanisms and traditional access control mechanisms used by firewalls is the place where the ...

4

Assisted Policy Management for SPARQL Endpoints Access Control

Assisted Policy Management for SPARQL Endpoints Access Control

... such that ad- ministrators are supported in including new vocabularies used to define the ac- cess conditions. Third, we plan to favour policy reuse across datasets by adding a “policy template” sharing functionality. ...

5

Show all 10000 documents...

Sujets connexes