Spatial Domains for the Administration of Location-based Access Control Policies

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Policy Mapper: A Simplified Approach for Administration of Location-based Access Control Policies

An important issue in mobile computing systems is the administration of locationbased access control policies, particularly the mechanism for specification and enforcement of spatial constraints. Simplifying the administration of such policies requires a mechanism that supports both an intuitive and scalable spatial constraint specification and a flexible enforcement architecture. In this paper...

متن کامل

‏‎facilitating lexical access for the fluent production of speech‎‏

‏‎the hypothesis is that recent and frequent exposure to lexical items leads to a more fluent production of speech in terms of rate of speech. to test the hypothesis , a one- way anova experimental design was carried out. 24 senior student of efl participated in a one-way interview test. data analyses revealed that those who were exposed frequently to the lexical items over a week prior to inte...

15 صفحه اول

‏‎faciliting lexical access for the fluent production of speech‎‏

‏‎the hypothesis is that recent and frequent exposure to lexical items leads to a more fluent production of speech in terms of rate of speech. to test the hypothesis,a one-way anova experimental design was carried out. 24 sednior students of efl participated in a one-way interview test. data analyses revealed that those who were exposed frequently to the lexical items over a week prior to inter...

15 صفحه اول

Negotiating Access Control Policies Between Autonomous Domains

Autonomous policy domains often need to share resources to accomplish a common task. To do this they must negotiate a common access control policy to the shared resources. We use mathematical techniques from game theory to show that the outcome of such negotiations can often be predicted from the distribution of power among the participants, independent of the actual mechanics of negotiation. W...

متن کامل

Rewriting-Based Access Control Policies

In this paper we propose a formalization of access control policies based on term rewriting. The state of the system to which policies are enforced is represented as an algebraic term, what allows to model many aspects of the policy environment. Policies are represented as sets of rewrite rules, whose evaluation produces deterministic authorization decisions. We discuss the relation between pro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Network and Systems Management

سال: 2008

ISSN: 1064-7570,1573-7705

DOI: 10.1007/s10922-008-9106-0