• Aucun résultat trouvé

XML Access Control Policies

The case for Access Control on XML relationships

The case for Access Control on XML relationships

... ) Figure 6. Impact of RA on the motivating example. Figure 6 delivers a different view of the measurements. It pictures the total cost of each algorithm’s phase and the extra cost incurred by relationship authorizations ...

24

XPACML eXtensible Privacy Access Control Markup Language

XPACML eXtensible Privacy Access Control Markup Language

... aware access control ...ces control-based ...new XML elements in the Target tag of ...policy access control ...their policies and preferences for a given Service ...

6

Client-Based Access Control Management for XML documents

Client-Based Access Control Management for XML documents

... where access control rules are user specific, dy- namic and then difficult to ...sharing policies change as the initial situation evolves (relationship between users, new partners, new projects with ...

28

On the isofunctionality of network access control lists

On the isofunctionality of network access control lists

... Studies focusing on the analysis of already deployed net- work ACLs typically aim at discovering and fixing conflicts and redundancies [1]. Chomsiri and Pornavalai [6] propose a method of analyzing ACL rules using ...

7

Verifying Resource Access Control on Mobile Interactive Devices

Verifying Resource Access Control on Mobile Interactive Devices

... As pointed out in Section 4, the CFGs on which the verification is done can be constructed automatically using well-known control flow analyses. As a consequence, the entire verification can be made fully ...

26

Access control in IoT environments: Feasible scenarios

Access control in IoT environments: Feasible scenarios

... JSON 12 for its suitability in constrained devices. A brief description of each el i rovided in 12 . 5. Our approach 5.1. Our architecture A test bed was implemented to demonstrate the feasibility of the approach. The ...

7

Access Control for HTTP Operations on Linked Data

Access Control for HTTP Operations on Linked Data

... the access conditions number on HTTP GET response time (Figure 5a and ...one access condi- tion, each including 5 ...of access conditions protecting the target RDF ...of access conditions ...

16

Database access control within a Java application

Database access control within a Java application

... A first perspective depends on the future of Oracle tools. When JDeveloper will be effectively competing with Designer as a data modeling tool, security features should be supported and the work presented in this paper ...

8

Access control in full-duplex wireless networks.

Access control in full-duplex wireless networks.

... DCF Access Mechanism In the DCF access mechanism, stations compete with each other to grasp the channel ...multiple access with collision avoidance ...

105

Trusted Access Control System for Smart Campus

Trusted Access Control System for Smart Campus

... secure access control system based on TEE and IBE for university ...trusted access control architecture is then proposed based on a TEE cloud architecture relying on ...overall access ...

8

Federated Access Control in Service Oriented Architecture

Federated Access Control in Service Oriented Architecture

... The access control of the shared services becomes an essential requirement for a secure federation of ...to access the services of others with his autho- rization information or ...different ...

10

An Access Control Model for Web Databases

An Access Control Model for Web Databases

... users and stopping the attack before it succeeds. Assuming that the database management system (DBMS) has an RBAC model in place, the key idea of our approach is as follows. We create application profiles that represent ...

9

Assisted Policy Management for SPARQL Endpoints Access Control

Assisted Policy Management for SPARQL Endpoints Access Control

... such that ad- ministrators are supported in including new vocabularies used to define the ac- cess conditions. Third, we plan to favour policy reuse across datasets by adding a “policy template” sharing functionality. ...

5

Authentication and access control based on distributed ledger technology

Authentication and access control based on distributed ledger technology

... capability-based access control mechanism (i.e. DAC that is implemented by access control matrix) based on smart contract for the IoT environment ...the access control process ...

9

Context-Aware Access Control for RDF Graph Stores

Context-Aware Access Control for RDF Graph Stores

... on access control ...the access conditions and the use of Semantic Web languages ...press access control policies for RDF documents, while we provide an authorization mechanism ...

7

Asymptotic performance of queue length based network control policies

Asymptotic performance of queue length based network control policies

... In this thesis, we study the interplay between the asymptotic behavior of buffer occupancy, queue length information, and traffic statistics in the context of sched[r] ...

204

Access control lists for the self-certifying filesystem

Access control lists for the self-certifying filesystem

... This thesis has demonstrated that the existing SFS infrastructure can be used to create a powerful, yet easy-to-use access control mechanism, which is well suited [r] ...

45

"Improving Network Access Control Integrity through Redundant Mechanisms"

"Improving Network Access Control Integrity through Redundant Mechanisms"

... Distributed Access Control The main difference between distributed access control mechanisms and traditional access control mechanisms used by firewalls is the place where the ...

4

Analysis and uncertainty of airport pushback rate control policies

Analysis and uncertainty of airport pushback rate control policies

... This thesis introduces the policies and simulates their performance at LaGuardia Airport while varying two policy parameters, the length of the prediction interval an[r] ...

112

A Social Semantic Web Access Control Model

A Social Semantic Web Access Control Model

... own policies in order to grant the access to their data only to those users who have the features they ...the access control model has to consider the social dimen- sion in which it is ...

13

Show all 6800 documents...

Sujets connexes