نتایج جستجو برای: policy control

تعداد نتایج: 1561601  

2007
Rafae Bhatti Maria Luisa Damiani David W. Bettis Elisa Bertino

An important issue in mobile computing systems is the administration of locationbased access control policies, particularly the mechanism for specification and enforcement of spatial constraints. Simplifying the administration of such policies requires a mechanism that supports both an intuitive and scalable spatial constraint specification and a flexible enforcement architecture. In this paper...

2008
Erik Rissanen Ludwig Seitz

The XACML standard defines an XML based language for defining access control policies and a related processing model. Recent work aims to add delegation to XACML in order to express the right to administrate XACML policies within XACML itself. The delegation profile draft explains how to validate the right to issue a policy, but there are no provisions for removing a policy. This paper proposes...

1995
Anja Schuhknecht Gabi Dreo

The introduction of new network services, broad-band multi-media and advanced mobile communications imposes high requirements on ATM network management. In such an environment, an essential task of ATM management is to prevent faults and to support eecient resource allocation. The idea is to specify parameters, according to which the behaviour of the network is monitored, and to perform the nec...

2012
Kyong-jin Kim Seng-phil Hong Joon Young Kim

Security and privacy have emerged as important issues owing to the proliferation of social networking site. Sharing and distribution of relationship-based information on social network sites can have a serious impact on an individual’s activity; moreover, it can exert a negative influence on the overall information society. To solve security and privacy issues of social networking, we introduce...

2005
Paul J. Goulart Eric C. Kerrigan

This paper is concerned with the stability of a class of robust and constrained optimal control laws for linear discrete-time systems subject to bounded state disturbances and arbitrary convex constraints on the states and inputs. The paper considers the class of feedback control policies parameterized as affine functions of the system state, calculation of which has recently been shown to be t...

1995
Anja Schuhknecht Gabi Dreo

The introduction of new network services, broad-band multi-media and advanced mobile communications imposes high requirements on ATM network management. In such an environment, an essential task of ATM management is to prevent faults and to support eecient resource allocation. The idea is to specify parameters, according to which the behaviour of the network is monitored, and to perform the nec...

2008
Tanveer Mustafa Karsten Sohr Duc-Hanh Dang Michael Drouineaud Stefan Kowski

Role-based access control (RBAC) is a powerful means for laying out and developing higher-level organizational policies such as separation of duty, and for simplifying the security management process. One of the important aspects of RBAC is authorization constraints that express such organizational policies. While RBAC has generated a great interest in the security community, organizations stil...

2003
Peng Li Yun Mao Steve Zdancewic

Information integrity policies are traditionally enforced by access control mechanisms that prevent unauthorized users from modifying data. However, access control does not provide end-to-end assurance of integrity. For that reason, integrity guarantees in the form of noninterference assertions have been proposed. Despite the appeals of such information-flow based approaches to integrity, that ...

2007
Eunjee Song Indrakshi Ray Hanil Kim

From a software design perspective, access control policies are requirements that must be addressed in a design. For example, access control policies are constraints that determine the type of access authorized users have on information resources. In this paper, we show how one can formulate access control policies as a policy model, formulate an access control aspect model that enforces polici...

2011
Gian Luigi Ferrari

The management of the operations acting over distributed and virtual resources plays an important role for achieving the success of modern distributed applications. In this paper, we advocate a notion of resources as entities with their own local policies and containing their global interactive properties. We introduce a variant of π-calculus with primitives to declare, acquire and release reso...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید