Information Flow Control among Objects in Role-Based Access Control Model
DEXA '01 Proceedings of the 12th International Conference on Database and Expert Systems Applications
Embedding role-based access control model in object-oriented systems to protect privacy
Journal of Systems and Software
Providing flexible access control to an information flow control model
Journal of Systems and Software
An agent-based inter-application information flow control model
Journal of Systems and Software - Special issue: Software engineering education and training
DPE/PAC: decentralized process engine with product access control
Journal of Systems and Software
An information flow control model for C applications based on access control lists
Journal of Systems and Software
Managing role relationships in an information flow control model
Journal of Systems and Software
Concurrency control based on role concept
International Journal of High Performance Computing and Networking
Preventing information leakage in C applications using RBAC-based model
SEPADS'06 Proceedings of the 5th WSEAS International Conference on Software Engineering, Parallel and Distributed Systems
Preventing Illegal Information Flow Based on Role-Based Access Control Model
NBiS '08 Proceedings of the 2nd international conference on Network-Based Information Systems
A purpose-based synchronisation protocol of multiple transactions in multi-agent systems
International Journal of Business Intelligence and Data Mining
A legal information flow (LIF) scheduler based on role-based access control model
Computer Standards & Interfaces
Role-based scheduling and synchronization algorithms to prevent illegal information flow
NBiS'07 Proceedings of the 1st international conference on Network-based information systems
Creating objects in the flexible authorization framework
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
A privacy enhanced role-based access control model for enterprises
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
OTM'05 Proceedings of the 2005 OTM Confederated international conference on On the Move to Meaningful Internet Systems: CoopIS, COA, and ODBASE - Volume Part II
Design and implementation of document access control model based on role and security policy
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
Hi-index | 0.00 |
Abstract: In this paper we propose an efficient parallel implementation of Edmonds' algorithm for finding optimum branchings on a model of the SIMD type with vertical data processing (the STAR-machine). To this end for a directed graph given as a list ...