Access control

Results: 10445



#Item
51Synthesising Verified Access Control Systems in XACML Nan Zhang School of Computer Science University of Birmingham Birmingham, UK, B15 2TT

Synthesising Verified Access Control Systems in XACML Nan Zhang School of Computer Science University of Birmingham Birmingham, UK, B15 2TT

Add to Reading List

Source URL: www.cs.bham.ac.uk.

Language: English - Date: 2009-02-25 10:33:24
    52Access Control for IoT: A Position Paper Alan H. Karp Introduction We get work done with our computers almost in spite of their usability, rather than because of it. This statement is particularly true when it comes to c

    Access Control for IoT: A Position Paper Alan H. Karp Introduction We get work done with our computers almost in spite of their usability, rather than because of it. This statement is particularly true when it comes to c

    Add to Reading List

    Source URL: alanhkarp.com

    Language: English - Date: 2016-01-30 23:35:47
      53World-Driven Access Control for Continuous Sensing Franziska Roesner David Molnar  Alexander Moshchuk

      World-Driven Access Control for Continuous Sensing Franziska Roesner David Molnar Alexander Moshchuk

      Add to Reading List

      Source URL: www.franziroesner.com

      Language: English - Date: 2014-08-31 10:37:50
        54Synthesising Verified Access Control Systems through Model Checking Nan Zhang, Mark Ryan∗ School of Computer Science University of Birmingham {nxz,mdr}@cs.bham.ac.uk

        Synthesising Verified Access Control Systems through Model Checking Nan Zhang, Mark Ryan∗ School of Computer Science University of Birmingham {nxz,mdr}@cs.bham.ac.uk

        Add to Reading List

        Source URL: www.cs.bham.ac.uk.

        Language: English - Date: 2009-02-25 10:33:23
          55Ellexus Ltd: The I/O Profiling Company Products: We make tools to help you take control of the way you access your data. Industries: Where big compute meets big data!

          Ellexus Ltd: The I/O Profiling Company Products: We make tools to help you take control of the way you access your data. Industries: Where big compute meets big data!

          Add to Reading List

          Source URL: www.goingarm.com

          - Date: 2018-01-24 12:00:28
            56Extensible Access Control with Authorization Contracts Scott Moore Christos Dimoulas  Robert Bruce Findler

            Extensible Access Control with Authorization Contracts Scott Moore Christos Dimoulas Robert Bruce Findler

            Add to Reading List

            Source URL: www.eecs.northwestern.edu

            - Date: 2016-10-10 16:16:25
              57Enabling Advanced and Context-Dependent Access Control in RDF Stores ? Fabian Abel1 , Juri Luca De Coi2 , Nicola Henze1 , Arne Wolf Koesling2 , Daniel Krause1 , Daniel Olmedilla2

              Enabling Advanced and Context-Dependent Access Control in RDF Stores ? Fabian Abel1 , Juri Luca De Coi2 , Nicola Henze1 , Arne Wolf Koesling2 , Daniel Krause1 , Daniel Olmedilla2

              Add to Reading List

              Source URL: www.olmedilla.info

              - Date: 2017-02-15 09:32:57
                58Policy Privacy in Cryptographic Access Control Anna Lisa Ferrara Georg Fuchsbauer  Bin Liu

                Policy Privacy in Cryptographic Access Control Anna Lisa Ferrara Georg Fuchsbauer Bin Liu

                Add to Reading List

                Source URL: epubs.surrey.ac.uk

                - Date: 2015-07-09 05:51:19
                  59Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation Philipp Holzinger∗ , Ben Hermann† , Johannes Lerch† , Eric Bodden‡ and Mira Mezini† ∗ Fraunhofer  SIT, Email: philipp.holzinger@sit

                  Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation Philipp Holzinger∗ , Ben Hermann† , Johannes Lerch† , Eric Bodden‡ and Mira Mezini† ∗ Fraunhofer SIT, Email: philipp.holzinger@sit

                  Add to Reading List

                  Source URL: bodden.de

                  - Date: 2017-03-20 03:40:38
                    60Using Description Logics in Relation Based Access Control Rui Zhang1 , Alessandro Artale2 , Fausto Giunchiglia1 and Bruno Crispo1 1  Faculty of Information Engineering and

                    Using Description Logics in Relation Based Access Control Rui Zhang1 , Alessandro Artale2 , Fausto Giunchiglia1 and Bruno Crispo1 1 Faculty of Information Engineering and

                    Add to Reading List

                    Source URL: ceur-ws.org

                    - Date: 2009-07-07 04:46:34