Discretionary access control

Results: 58



#Item
11Capability-based security / Intel iAPX 432 / Discretionary access control / Kernel / Authorization / Capability-based addressing / Mandatory access control / Security / Computer security / Access control

On Access Checking in Capability-Based Systems1 Richard Y. Kain Carl E. Landwehr University of Minnesota

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:00:23
12Programming language theory / Type system / Lambda calculus / Subtype polymorphism / System F / Π-calculus / Type safety / Type theory / Software engineering / Theoretical computer science

Under consideration for publication in Math. Struct. in Comp. Science A Type System for Discretionary Access Control M I C H E L E B U G L I E S I1 , D A R I O C O L A Z Z O2 , S I L V I A C R A F A3 , and D A M I A N O

Add to Reading List

Source URL: www.dsi.unive.it

Language: English - Date: 2010-06-10 05:02:46
13Software engineering / Theoretical computer science / Object-oriented programming / Polymorphism / Subtype polymorphism / Type system / Type theory / Data types / Programming language theory

Type Based Discretionary Access Control? Michele Bugliesi, Dario Colazzo, and Silvia Crafa Universit`a Ca’ Foscari, Venezia Abstract. Discretionary Access Control (DAC) systems provide powerful mechanisms for resource

Add to Reading List

Source URL: www.dsi.unive.it

Language: English - Date: 2005-06-07 06:54:08
14Software as a service / Software distribution / Software industry / Access control / Discretionary access control / Security / Computing / Cloud computing

Microsoft PowerPoint - Rec 4 a-c v1.ppt

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2012-02-07 16:10:05
15Access control / Computer security / Information retrieval / Collaborative filtering / Social information processing / Recommender system / Role-based access control / Shared resource / Document collaboration / Collaboration / Security / Computing

Using Recommenders for Discretionary Access Control Suresh Chari Larry Koved Mary Ellen Zurko IBM Research IBM Software Group

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2012-02-07 16:10:04
16Ls / Benn / Find

COMPUTER SCIENCE TRIPOS Part IB – 2013 – Paper 4 9 Security I (MGK) (a) While inspecting the discretionary access-control arrangements on a Unix computer, you find the following setup:

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-06-09 10:18:42
17Logical consequence / Reasoning / Exponentiation / Rule of inference / Logic / Propositional calculus / Inference

Safety in Discretionary Access Control for Logic-based Publish-Subscribe Systems Kazuhiro Minami, Nikita Borisov, and Carl A. Gunter University of Illinois at Urbana-Champaign {minami,

Add to Reading List

Source URL: systemsresilience.org

Language: English - Date: 2013-01-05 00:32:20
18Risk management / Identity management / Actuarial science / XACML / Role-based access control / Risk / PERMIS / Mandatory access control / Discretionary access control / Security / Computer security / Access control

Towards Attribute-based Access Control Policy Engineering Using Risk∗ Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, and Artsiom Yautsiukhin Istituto di Informatica e Telematica, Consiglio Nazionale delle R

Add to Reading List

Source URL: wwwold.iit.cnr.it

Language: English - Date: 2014-09-19 11:36:58
19Role-based access control / Graph theory / Graph / Role hierarchy / PERMIS / Filesystem permissions / Discretionary access control / Clique / Tree / Security / Computer security / Access control

T RANSACTIONS ON D ATA P RIVACY () –26 Efficient Graph Based Approach to Large Scale Role Engineering Dana Zhang∗ , Kotagiri Ramamohanarao∗ , Rui Zhang∗ , Steven Versteeg∗∗ ∗ The

Add to Reading List

Source URL: www.ruizhang.info

Language: English - Date: 2014-02-27 08:22:04
20MINIX / Trusted Computer System Evaluation Criteria / Rainbow Series / Trusted computing base / Operating system / Trusted system / Discretionary access control / Andrew S. Tanenbaum / Ring / Computer architecture / Computer security / Computing

Trusted MINIX: A Worked Example Albert L. Donaldson ESCOM Corporation[removed]Waples Mill Road Oakton, VA 22124

Add to Reading List

Source URL: www.escom.com

Language: English - Date: 2006-07-19 10:32:27
UPDATE