In this paper, the approaches to introducing security policy into Role-Based Access Control (RBAC) and the Common Data Security Architecture (CDSA) are proposed. We apply security policy to a role's privileges in RBAC. An extended RBAC using PKI and roleassignment policy is described. The improved C
A Meta-model of Access Control in a Fibred Security Language
β Scribed by Steve Barker; Guido Boella; Dov M. Gabbay; Valerio Genovese
- Publisher
- Springer Netherlands
- Year
- 2009
- Tongue
- English
- Weight
- 358 KB
- Volume
- 92
- Category
- Article
- ISSN
- 0039-3215
No coin nor oath required. For personal study only.
π SIMILAR VOLUMES
## Abstract In response to international terrorism, the United States government has actively sought to reorganize information flows to and from individuals, the media, and other nations. These government actions lead to information asymmetry, with certain realms becoming relatively βinformation po
In this paper a time-discrete dynamic model for the process of disarmament is investigated. The state variables of the system are costs and security values. We assume that the costs can be controlled, and we aim at reducing the costs to zero and achieving non-negative security values after a finite
In the past several years, a number of different language modeling improvements over simple trigram models have been found, including caching, higher-order n-grams, skipping, interpolated Kneser-Ney smoothing, and clustering. We present explorations of variations on, or of the limits of, each of the