Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Use of metadata for computing resource access
GB Roth, KR O'neill, EJ Brandwine, BI Pratt… - US Patent …, 2015 - Google Patents
Delegatee t 1200 themselves may include metadata that may be used in deter mining
whether to fulfill requests to access the one or more computing resources. The metadata …
whether to fulfill requests to access the one or more computing resources. The metadata …
Techniques for delegation of access privileges
KR O'neill, GB Roth, EJ Brandwine, BI Pratt… - US Patent …, 2014 - Google Patents
6,957,393 B2 10/2005 Fano et al. the session credentials may be fulfilled depending O
whether 7,073,195 B2* 7/2006 Brickell et al.................... 726.5 they are allowed by the set of …
whether 7,073,195 B2* 7/2006 Brickell et al.................... 726.5 they are allowed by the set of …
PolyOrBAC: A security framework for Critical Infrastructures
A Abou El Kalam, Y Deswarte, A Baïna… - International Journal of …, 2009 - Elsevier
Due to physical and logical vulnerabilities, a critical infrastructure (CI) can encounter failures
of various degrees of severity, and since there are many interdependencies between CIs …
of various degrees of severity, and since there are many interdependencies between CIs …
MotOrBAC 2: a security policy tool
Given the growing complexity of information systems and the difficult task of security policy
enforcement, system administrators need simple and powerful security management tools …
enforcement, system administrators need simple and powerful security management tools …
A delegation model for extended RBAC
M Ben-Ghorbel-Talbi, F Cuppens… - International journal of …, 2010 - Springer
In the field of access control, delegation is an important aspect that is considered part of the
administration mechanism. Thus, a comprehensive access control model must provide a …
administration mechanism. Thus, a comprehensive access control model must provide a …
Dynamic delegation based on temporal context
Delegation is a very important part of the administrative process in access control systems; it
provides resiliency and flexibility regarding to the management procedure. Delegation is the …
provides resiliency and flexibility regarding to the management procedure. Delegation is the …
A framework for translating a high level security policy into low level security mechanisms
Security policies have different components; firewall, active directory, and IDS are some
examples of these components. Enforcement of network security policies to low level …
examples of these components. Enforcement of network security policies to low level …
Specifying intrusion detection and reaction policies: An application of deontic logic
N Cuppens-Boulahia, F Cuppens - … on Deontic Logic in Computer Science, 2008 - Springer
The security policy of an information system may include a wide range of different
requirements. The literature has primarily focused on access and information flow control …
requirements. The literature has primarily focused on access and information flow control …
An approach based on model-driven engineering to define security policies using orbac
In the field of access control, many security breaches occur because of a lack of early means
to evaluate if access control policies are adequate to satisfy privileges requested by subjects …
to evaluate if access control policies are adequate to satisfy privileges requested by subjects …
[PDF][PDF] Fi-orbac: A model of access control for federated identity platform
F Layouni, Y Pollet - Proceedings of the IADIS International Conference …, 2009 - Citeseer
In the information security field, the issue of access control is a crucial element. This access
control is governed by a security policy that defines precisely the authorized actions for all …
control is governed by a security policy that defines precisely the authorized actions for all …