Showing 1 - 20 results of 47 for search '"access control"', query time: 0.08s Refine Results
  1. 1
  2. 2

    The formalisation and transformation of access control policies by Slaymaker, M, Mark Slaymaker

    Published 2011
    “…Each data owner will have access control policies that are carefully crafted and understood --- defined in terms of the access control representation that they use, which may be very different from the model of access control utilised by other data owners or by the technology facilitating the data sharing. …”
    Thesis
  3. 3

    Conformance Checking of Dynamic Access Control Policies by Power, D, Slaymaker, M, Simpson, A

    Published 2011
    “…The capture, deployment and enforcement of appropriate access control policies are crucial aspects of many modern software-based systems. …”
    Journal article
  4. 4
  5. 5

    Evolving access control: formal models and analysis by Sieunarine, C, Clint Sieunarine

    Published 2011
    “…Traditionally, approaches to access control have fallen into one of two categories: discretionary access control (DAC) or mandatory access control (MAC). …”
    Thesis
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10

    On Formalizing and Normalizing Role-Based Access Control Systems by Power, D, Slaymaker, M, Simpson, A

    Published 2009
    “…Role-based access control (RBAC) has emerged as the dominant access control paradigm for service-oriented systems, with this dominance being reflected by the popularity of RBAC both with the research community and with information technology vendors. …”
    Journal article
  11. 11
  12. 12
  13. 13

    Proximity−based Access Control for Implantable Medical Devices by Rasmussen, K, Castelluccia, C, Heydt−Benjamin, T, Čapkun, S

    Published 2009
    “…We propose a proximity-based access control scheme for implantable medical devices (IMDs). …”
    Conference item
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18

    On the need for user-defined fine-grained access control policies for social networking applications by Simpson, A

    Published 2008
    “…Specifically, we concern ourselves with authorisation, and argue that members of such social networks should have the opportunity to construct fine-grained access control policies that meet their particular requirements and circumstances, and, in addition, should be able to observe appropriate audit information.…”
    Journal article
  19. 19
  20. 20

    Assigning channels by link directionality in a medium access control protocol for IEEE 802.11 ad hoc networks by Ng, P, Edwards, D, Liew, S

    Published 2009
    “…The authors thus propose a link-directionality- based dual-channel medium access control protocol in an attempt to double the capacities of networks using the single-channel IEEE 802.11 protocol. …”
    Journal article