Now showing items 1-10 of 14
Security management for mobile ad hoc network of networks (MANoN).
(IGI Publishing, 2010)
Access control mechanism for mobile ad hoc network of networks.
(IEEE Computer Society, 2010-03)
Concurrent enforcement of usage control policies.
Deriving enforcement mechanisms for policies
A compositional event and time-based policy model
Dynamic Access Control Policies - Specification and Verification
(Oxford University Press, 2012)
Security requirements deal with the protection of assets against unauthorized access (disclosure or modification) and their availability to authorized users. Temporal constraints of history-based access control policies ...
Analysis and run-time verification of dynamic security policies.
Generating OWL ontology for database integration.