• DISCOVER

  • Referenced in 8 articles [sw02247]
  • registered applications using a browser. The application control network enables sensors and actuators ... objects and allow them to be directly accessed at the interaction server. Security ... authentication are provided using customizable access control lists and SSL-based secure servers...
  • ASASP

  • Referenced in 5 articles [sw06350]
  • procedure for the analysis of administrative access control policies. The tool represents access policies ... extensions of) the Role-Based Access Control model. Our tool shows better scalability than...
  • ELAN

  • Referenced in 108 articles [sw02179]
  • language allowing the programmer to specify the control on rules application. This is in contrast ... reduction strategy is hard-wired and not accessible to the designer of an application...
  • Frenetic

  • Referenced in 7 articles [sw16270]
  • routing, traffic monitoring, load balancing, and access control. Unfortunately, the languages used to program today...
  • ASAP

  • Referenced in 6 articles [sw02689]
  • systems. We introduce a novel medium access control (MAC) protocol for radio frequency identification (RFID...
  • Aglet

  • Referenced in 4 articles [sw13305]
  • allow programmers to express and enforce access control and information flow policies. In this paper ... typed programming languages, such as decentralized access control, typed proof-carrying authorization, ephemeral and dynamic...
  • RBAC-PAT

  • Referenced in 3 articles [sw00782]
  • Role-Based Access Control (RBAC) has been widely used for expressing access control policies. Administrative ... Role-Based Access Control (ARBAC) specifies how an RBAC policy may be changed by each...
  • VeriCon

  • Referenced in 5 articles [sw16297]
  • controller, e.g., to specify routing and access control policies. SDN opens up the possibility...
  • Succinct

  • Referenced in 5 articles [sw09703]
  • analysis engines for solving data and control flow problems expressed in clausal form ... properties of Java Card byte-code, access control features of Mobile and Discretionary Ambients...
  • affy

  • Referenced in 39 articles [sw08345]
  • having access to and methods for probelevel data results in improvements to quality control assessments...
  • RAST

  • Referenced in 8 articles [sw17158]
  • incorporated into the standard views. User access is controlled to ensure data privacy...
  • PROCOL

  • Referenced in 8 articles [sw02535]
  • only 1 message is transferred. PROCOL controls object access by an explicit per-object protocol...
  • HBAC

  • Referenced in 2 articles [sw09882]
  • HBAC: A model for history-based access control and its model checking. Stack inspection ... broadly used as dynamic access control infrastructure in such runtime environments as Java virtual machines ... finished. To solve this problem, access control models based on execution history have been proposed ... formal model for programs with access control based on execution history, which are called HBAC...
  • Figaro

  • Referenced in 11 articles [sw28902]
  • programming language, giving it access to a rich type system, control abstractions and libraries...
  • Plutus

  • Referenced in 10 articles [sw22497]
  • individual users to retain direct control over who gets access to their files. We explain...
  • KLAIM

  • Referenced in 72 articles [sw09424]
  • language provides coordination mechanisms to control the interaction protocols among located processes. The formal operational ... with a type system that statically checks access right violations of mobile agents. Types...
  • ACCESSPROV

  • Referenced in 1 article [sw38688]
  • ACCESSPROV: tracking the provenance of access control decisions. Access control protects security-sensitive operations from ... access by unauthorized subjects. Unfortunately, access control mechanisms are implemented manually in practice, which ... static analysis, but the correctness of access control enforcement depends on runtime factors, such ... access control policies enforced and adversary control of the program inputs. As a result...
  • Accumulo

  • Referenced in 3 articles [sw17032]
  • novel features such as cell-based access control and a server-side programming mechanism that...
  • Sancus

  • Referenced in 3 articles [sw24321]
  • with hardware support for the memory access control and cryptographic functionality required to run Sancus...
  • MoVES

  • Referenced in 3 articles [sw01357]
  • protocol stack including IEEE 802.11 Medium Access Control, up to the Application layer. MoVES provides...