Mapping applications to the RaPiD configurable architecture

C Ebeling, DC Cronquist, P Franklin… - … . The 5th Annual …, 1997 - ieeexplore.ieee.org
The goal of the RaPiD (Reconfigurable Pipelined Datapath) architecture is to provide high
performance configurable computing for a range of computationally-intensive applications …

A framework for risk-aware role based access control

KZ Bijon, R Krishnan, R Sandhu - 2013 IEEE Conference on …, 2013 - ieeexplore.ieee.org
Over the years, role based access control (RBAC) has remained a dominant form of access
control both in the industry and academia. More recently, the need for risk awareness in …

Improving the creation and management of collaborative networks within the European maritime sector

T Vuletic, RI Whitfield, W Wang, A Duffy… - Journal of Industrial …, 2017 - Elsevier
The first ever model of operational collaboration for the European maritime industry is
presented, built upon the established current state-of-the art in engineering collaboration …

Group-based discretionary access control for epidemiological resources

J Zamite, D Domingos, MJ Silva, C Santos - Procedia Technology, 2013 - Elsevier
Scientific repositories promote information sharing at a global scale. However, users will
share sensitive resources in such repositories only if they are trustable. In addition, they …

[图书][B] Constraints for attribute based access control with application in cloud IaaS

KZ Bijon - 2015 - search.proquest.com
Recently, attribute based access control (ABAC) has received considerable attention from
the security community for its policy flexibility and dynamic decisionmaking capabilities. The …

A lattice interpretation of group-centric collaboration with expedient insiders

KZ Bijon, T Ahmed, R Sandhu… - 8th International …, 2012 - ieeexplore.ieee.org
For various reasons organizations need to collaborate with external consultants, eg domain
specialists, on specific projects. Many security-oriented organizations deploy multi-level …

[图书][B] Equivalence of group-centric collaboration with expedient insiders (GEI) and LBAC with collaborative compartments (LCC)

T Ahmed, R Sandhu, K Bijon, R Krishnan - 2012 - profsandhu.com
Equivalence of access control models can be proved by comparing their expressive power.
Tripunitara and Li [3] have given a generalized theoretical formulation for comparing …

A Lattice Interpretation of Group-Centric Collaboration with Expedient Insiders

T Ahmed, R Sandhu, R Krishnan - 8th IEEE International Conference on …, 2012 - eudl.eu
For various reasons organizations need to collaborate with external consultants, eg domain
specialists, on specific projects. Many security-oriented organizations deploy multi-level …

[引用][C] 支持协作的强制访问控制模型

范艳芳, 蔡英 - 计算机研究与发展, 2015

[引用][C] 面向射孔数据协作的文件授权访问控制模型

尚福华, 李盼 - 计算机技术与发展, 2016