Main View
This view is used for searching all possible sources.
First Page Previous Page 1 2 3 Next Page Last Page
 
1
IMPLEMENTING REAL-TIME UPDATE OF ACCESS CONTROL POLICIES

IMPLEMENTING REAL-TIME UPDATE OF ACCESS CONTROL POLICIES Indrakshi Ray, Tai Xin Department control policies, that is, updating policies while they are in effect and enforcing the changes of ac- cess control policies that arise in a ...

E-print Network

2
Model Based Analysis and Validation of Access Control Policies.
2006-01-01

We present a model based approach to describing, analyzing and validating access control policies. Access control policies are described using VDM - a model oriented formal method. Policy descriptions are concise and may be easily manipulated. The ...

National Technical Information Service (NTIS)

3
Access Control Policy Analysis and Visualization Tools for Security Professionals

Access Control Policy Analysis and Visualization Tools for Security Professionals Kami Vaniea they need to better manage their rules. Unfortunately few of these analysis tools connect a policy problem, Standardization Keywords Access control, Usability, Visualization, ...

E-print Network

4
Globalization: US Export Control Policy and Implications for ...
2003-04-07

... Accession Number : ADA415479. Title : Globalization: US Export Control Policy and Implications for US Military Dominance. ...

DTIC Science & Technology

5
An Analysis of SERVMART Inventory Control Policies.
1973-03-01

... Accession Number : AD0761757. Title : An Analysis of SERVMART Inventory Control Policies. Descriptive Note : Master's thesis,. ...

DTIC Science & Technology

6
Discretionary Security for Object-Oriented Database Systems.
1991-01-01

The discretionary access controls in today's computer systems are designed to enforce a specific access control policy. An application whose access control policies do not easily match the policy that is wired ...

National Technical Information Service (NTIS)

7
A Linux-Based Approach to Low-Cost Support of Access ...
1999-09-01

... that enforce Mandatory Access Control (MAC) policies are ... of trusted computer system interfaces. ... MAN COMPUTER INTERFACE, POLICIES, DATA ...

DTIC Science & Technology

8
Policy Manual - Infection Control Policies - References

�CCR Home� �About CCR� �CCR Intranet������� Laboratory of Pathology LP Home Clinical Services Basic Sciences Training LP Staff Accessibility of Web Site Policy Manual Main Page LP Forms and Checklists Infection Control Policies General Infection Policies Categorization

Cancer.gov

9
Negotiating Access Control Policies Between Autonomous Domains.
2002-01-01

Autonomous policy domains often need to share resources to accomplish a common task. To do this they must negotiate a common access control policy to the shared resources. We use mathematical techniques from game theory to show that the outcome of such ne...

National Technical Information Service (NTIS)

10
CHEMICAL WEAPONS ARMS CONTROL: VERIFICATION ...
1990-06-08

... Accession Number : ADD752806. Title : CHEMICAL WEAPONS ARMS CONTROL: VERIFICATION TECHNOLOGY AND POLICY ISSUES. ...

DTIC Science & Technology

11
Assessing Quality of Policy Properties in Verification of Access Control Policies

policies makes them far more interest- ing. Each version of CONTINUE has approximately 300 rules and the column groups 1 and 2 correspond to the SIMPLE policy and the CONTINUE policy, respectively. In the caseAssessing Quality of Policy Properties in Verification of Access ...

E-print Network

12
Requirements for Scalable Access Control and Security ...
2011-05-13

... In the IETF, the RAP (RSVP Admission Policy) working ... 3 or 4, and access control information will ... We call this mechanism �lazy pol- icy instantiation ...

DTIC Science & Technology

13
Protection in Programmed Systems.
1973-01-01

The report discusses the control of access to objects within programmed systems. The vehicle for this study is a model of protection that isolates a small set of mechanisms needed to provide access control, leaving the policy for invoking these mechanisms...

National Technical Information Service (NTIS)

14
ES, G-99-014, NASA's Badging Program and Physical Access Controls ...

The objective was to focus on whether policies and procedures are in place to adequately control access to facilities including mission critical locations ...

NASA Website

15
Immigration Control: Immigration Policies Affect INS Detention ...
1992-06-25

... Accession Number : ADA298483. Title : Immigration Control: Immigration Policies Affect INS Detention Efforts. Corporate ...

DTIC Science & Technology

16
Chinese Nuclear Weapons and Arms Control Policies.
1985-12-04

... Accession Number : ADA307340. Title : Chinese Nuclear Weapons and Arms Control Policies. Descriptive Note : Final rept.,. ...

DTIC Science & Technology

17
Foundation for a Time Interval Access Control Model.
2005-01-01

A new model for representing temporal access control policies is introduced. In this model, temporal authorizations are represented by time attributes associated with both subjects and objects, and a time interval access graph. The time interval access gr...

National Technical Information Service (NTIS)

18
Testing Access Control Policies JeeHyun Hwang1

Testing Access Control Policies JeeHyun Hwang1 Evan Martin1 Tao Xie1 Vincent C. Hu2 1 Department policies is critical and yet challenging. Pol- icy testing is an important means to increasing confidence in the correctness of specified policies and their implemen- tations for ...

E-print Network

19
Policy Conflict Analysis Using Free Variable Tableaux for Access Control in Web Services Environments

Policy Conflict Analysis Using Free Variable Tableaux for Access Control in Web Services, Verification Keywords Access Control, Policy Analysis, Conflict Detection, Free Variable Tableaux, Abduction 1 introduces the Web Services model for policy ...

E-print Network

20
Automated Test Generation for Access Control Policies via Change-Impact Analysis

Automated Test Generation for Access Control Policies via Change-Impact Analysis Evan Martin North- erates tests for access control policies by leveraging change- impact analysis. We have implemented to the change-impact analysis tool so that specifi- cally targeted parts ...

E-print Network

First Page Previous Page 1 2 3 Next Page Last Page
 
First Page Previous Page 1 2 3 Next Page Last Page
 
21
Providing Policy�Neutral and Transparent Access Control in Extensible Systems \\Lambda

Providing Policy�Neutral and Transparent Access Control in Extensible Systems \\Lambda Robert Grimm Brian N. Bershad frgrimm, bershadg@cs.washington.edu Dept. of Computer Science and Engineering an access control mechanism for extensible sys� tems to address this problem. Our ...

E-print Network

22
Context-Based E-Health System Access Control Mechanism
2009-01-01

E-Health systems logically demand a sufficiently fine-grained authorization policy for access control. The access to medical information should not be just role-based but should also include the contextual condition of the role to access data. In this paper, we present a mechanism to extend the ...

NASA Astrophysics Data System (ADS)

23
Logical Representation of Common Rules for Controlling Access to Classified Information.
2009-01-01

Official policies for controlling access to classified information in the U.S. are quite complex and often difficult to enforce. We present an encoding of a common core of these policies in an authorization logic, and describe their rigorous enforcement i...

National Technical Information Service (NTIS)

24
Building a Dynamic Interoperable Security Architecture for ...
2002-10-01

... in the paradigm to build dynamic security ... a variety of policy strategies and enforcement ... authentication and access-control mechanisms was ...

DTIC Science & Technology

25
Security Ontology for Annotating Resources
2005-08-31

... well as access control policies, privacy policies, and QoS issues in a ... File names start with lowercase letters. ... of several words, the first letter of every ...

DTIC Science & Technology

26
Nomenclature Control Policies

... Us; A to Z Subject Index; Site Map; Web Site Policies; Transparency; FOIA; Accessibility; No FEAR Act. Combination Products; Advisory Committees; Science & ...

Center for Drug Evaluation (CDER)

27
Medium Access Control for XG Communications
2004-06-01

... to create a machine-readable semantic markup language. ... from the much larger database, the policy ... the policy reasoner to search for opportunities. ...

DTIC Science & Technology

28
Guide to Securing Microsoft Windows 2000 Active Directory
2000-12-01

... Windows Settings? Security Settings? Local Policies? Audit Policy ... At the Access Control Settings window, determine whether auditing entries ...

DTIC Science & Technology

29
Access Control for Smarter Healthcare Using Policy Spaces$

the title "Regulating Exceptions in Healthcare using Policy Spaces," in Proc. of the 22nd Annual IFIP WG 11 the policies are defined in the different spaces. Section 7 describes the policy 2 #12;evaluation and enforcement the runtime evaluation of the access control policy. ...

E-print Network

30
Using Parameterized UML to Specify and Compose Access Control Models
2003-12-01

Abstract: Situations can arise in which organizations have to merge policies that are based on different access control frameworks, such as Role Based Access Control (RBAC) and Mandatory Access Control (MAC). Integrating policies ...

E-print Network

31
Access Control for Shared Resources
2005-01-01

Access control for shared resources is a complex and challenging task, in particular if the access control policy should be able to cope with different kind of sharing and collaboration. The reason for this is that traditional access control system ...

E-print Network

32
Access Nets: Modeling Access to Physical Spaces
2011-01-01

Electronic, software-managed mechanisms using, for example, radio-frequency identification (RFID) cards, enable great flexibility in specifying access control policies to physical spaces. For example, access rights may vary based on time of day or could differ in normal versus emergency situations. With such ...

NASA Astrophysics Data System (ADS)

33
Conflict Detection and Resolution of XACML Policies
2010-01-01

Enterprises and other organizations are making more and more use of XACML-based access control solutions. An administrator who is responsible for the creation and maintenance of the access control policies faces a lot of problems that are insufficiently solved up to now. One of these problems ...

E-print Network

34
Idaho Weed Control Association ( IWCA )

Quote: "Idaho Weed Control Association promotes responsible weed management stewardship through Education, Communication, and Public Policy." The web site provides access to ... ...

NBII National Biological Information Infrastructure

35
Access Control in Distributed Systems
2009-02-22

Treatments of access control and authorization typically focus on individual mechanisms (access control lists, capabilities) or types of policies. This module seeks to isolate the basic concepts underlying many types of authorization in distributed systems, and then to show how this perspective ...

NSDL National Science Digital Library

36
History-Based Access Control for Distributed Processes
2005-01-01

This paper presents a type system to control the migration of code between network nodes in a concurrent distributed framework, using the D? language. We express resource access policies as types and enforce policies via a type system. Types describe paths travelled by migrating code, enabling the ...

NASA Astrophysics Data System (ADS)

37
48 CFR 304.1300 - Policy.
2010-10-01

... GENERAL ADMINISTRATIVE MATTERS Personal Identity Verification...subpart: (1) Access: �Physical� entry to and...fraud related to contractor physical access to Federally-controlled...related to routine, long-term physical access to...

Code of Federal Regulations, 2010

38
47 CFR 1.20003 - Policies and procedures for employee supervision and control.
2010-10-01

...employee responsible for ensuring that any interception of communications or access to...carrier personnel to implement the interception of communications or access to call-identifying...it will maintain its records of each interception of communications or access to...

Code of Federal Regulations, 2010

39
Use of Logic to describe Enhanced Communications Services

) and an enforcement model. We have been able to formulate the English language versions of our policies in Ponder calls to be handled. This logic is encapsulated in a user-friendly policy description language. The transferability of a policy description language (Ponder) developed for system management and access ...

E-print Network

40
A Role Based XACML Administration and Delegation Profile and Its Enforcement Architecture

Security Keywords authorization, access control, administration, delegation, RBAC, ARBAC, XACML, Web a delegation chain. If the authority of the policy issuer can be traced back to a trusted policy through a chain of delegations, the policy is used by the PDP, and discarded otherwise. The ...

E-print Network

First Page Previous Page 1 2 3 Next Page Last Page
 
First Page Previous Page 1 2 3 Next Page Last Page
 
41
Joint design and separation principle for opportunistic spectrum access
2006-01-01

Abstract � This paper develops optimal strategy for opportunistic spectrum access (OSA) by integrating the design of spectrum sensor at the physical layer with that of spectrum sensing and access policies at the medium access control (MAC) layer. The design objective is to maximize the ...

E-print Network

42
Service-Oriented, Distributed, High-Performance Computing.
2005-01-01

In this work we explore the use of process algebra in formalising and analysing access control policies. We do this by considering a standard access control language (XACML) and show how the core concepts in the language can be represented in CSP. We then...

National Technical Information Service (NTIS)

43
Dynamic Policy Evaluation for Containing Network Attacks (DEFCN).
2005-01-01

The DARPA funded DEFCN project at USC's Information Sciences Institute has developed an access control framework that is sensitive to network threat conditions. Project members developed the Generic Authorization and Access control Application Programming...

National Technical Information Service (NTIS)

44
48 CFR 4.1301 - Policy.
2010-10-01

...REGULATION GENERAL ADMINISTRATIVE MATTERS Personal Identity Verification 4...performance requires contractors to have routine physical access to a Federally-controlled facility...require the contractor to have routine physical access to a Federally-controlled...

Code of Federal Regulations, 2010

45
Target Data Portal

Site Map | Contact Us About TARGET DataData AccessBrowse DataAnalyze Data Overview|Open-Access Tier|Controlled-Access Tier Resources To learn more about TARGET Data Access, click the links below. TARGET Data Access Policy Data Access Request Data

Cancer.gov

46
Invited Paper to be published in IEEE Network Special issue on Policy Based Networking March 2002 Security and Management Policy Specification

for the recent interest in policy-based services, networks and security systems is to support dynamic in different countries in an international organisation. It is also useful to group the policies pertaining policy specification � Role Based Access Control provides the grouping of ...

E-print Network

47
Efficient Key Management for Enforcing Access Control in Outsourced Scenarios
2009-01-01

Data outsourcing is emerging today as a successful paradigm allowing individuals and organizations to exploit external servers for storing and distributing data. While trusted to properly manage the data, external servers are often not authorized to read them, therefore requiring data to be encrypted. In such a context, the application of an access control ...

NASA Astrophysics Data System (ADS)

48
Akenti Access To zetoc
2003-01-01

With more services populating the UK's Grid with strict access control policies and users in multilevelled organisations with multi-lateral collaborations, there is a real need for careful control of access to data and resources. A2Z is an ongoing JISC funded project to investigate the use of ...

E-print Network

49
Patterns for Access Control in Distributed Systems Nelly Delessy, Eduardo B. Fernandez, Maria M. Larrondo-Petrie, and Jie Wu

Patterns for Access Control in Distributed Systems Nelly Delessy, Eduardo B. Fernandez, Maria M. Larrondo-Petrie, and Jie Wu Department of Computer Science and Engineering Florida Atlantic University, the Policy-Based Access Control which models how to decide if a subject is authorized to ...

E-print Network

First Page Previous Page 1 2 3 Next Page Last Page