• No results found

[PDF] Top 20 Requirements-based access control analysis and policy specification (RECAPS)

Has 10000 "Requirements-based access control analysis and policy specification (RECAPS)" found on our website. Below are the top 20 most common "Requirements-based access control analysis and policy specification (RECAPS)".

Requirements-based access control analysis and policy specification (RECAPS)

Requirements-based access control analysis and policy specification (RECAPS)

... goal-based requirements acquisition and elaboration method [13], to refine security requirements into specific authorization rules and ACPs expressed in Ponder –– a language for specifying management ... See full document

10

Requirements-Based Access Control Analysis and Policy Specification

Requirements-Based Access Control Analysis and Policy Specification

... compare ReCAPS with Fontain’s approach in an educational ...the ReCAPS with no method support at ...a ReCAPS group and a control ...that ReCAPS allows analysts to better specify ... See full document

256

Integrating access control policy specification into the software development process

Integrating access control policy specification into the software development process

... There are two responses to this concern. First, it is still important to confirm that the ReCAPS group significantly outperformed the control group. For the Hawthorne Effect to be a potential threat to ... See full document

10

Automated extraction of attributes from natural language attribute-based access control (ABAC) Policies

Automated extraction of attributes from natural language attribute-based access control (ABAC) Policies

... real-world requirements would be ...particular policy element, and (3) the manual part of the injection process was conducted by ...in access control ...text analysis tools, to name ... See full document

25

A framework for privacy-enhanced access control analysis in requirements engineering

A framework for privacy-enhanced access control analysis in requirements engineering

... of analysis are provided in RACAF as shown in Figure ...of analysis addresses several aspects of access control according to their abstraction ...data analysis, ... See full document

9

Synthesizing a specification-based monitor for safety requirements

Synthesizing a specification-based monitor for safety requirements

... event-based specification, and an internal view, state- based one, of safety requirements violations; accordingly, it can be used for both event-based and state- based ...event ... See full document

22

Decentralized Access Control Based Crime Analysis

Decentralized Access Control Based Crime Analysis

... where access control is widely being used is health ...enable access to medical professionals, hospital staff, researchers, and policy ...to control the access of data so that ... See full document

5

Analogical specification reuse during requirements analysis

Analogical specification reuse during requirements analysis

... 4.14 Number of subjects using a strategy within 5-minute periods in Study 4 4.15 Average number of utterances of mental behaviours verbalised and average number of components added to st[r] ... See full document

272

Analogical specification reuse during requirements analysis

Analogical specification reuse during requirements analysis

... Allocate objects to resources if available Requirement A set of requirements • Resource •mixastannessision•s• Save requirements if no resources available 1 Cancelled allocations A set of[r] ... See full document

286

Modified Role Based Access Control Model For Data Security

Modified Role Based Access Control Model For Data Security

... appropriate access methods and index strategies have been developed for the stored ...temporal analysis technique which detects any queries that request execution outside a predefined time schedule and may ... See full document

5

A Survey on Access Control in the Age of IoT

A Survey on Access Control in the Age of IoT

... Access Control) [36], RBAC (Role-Based Access Control) is also a policy mechanism which are based 240. on the role of users in the system and the permissions given to them [37][r] ... See full document

12

Visualization Analysis of Multi Domain Access Control Policy Integration Based on Tree Maps and Semantic Substrates

Visualization Analysis of Multi Domain Access Control Policy Integration Based on Tree Maps and Semantic Substrates

... The characteristics of RBAC model, such as role hier- archy, least privilege and separate of duty, make it widely used in multi-domain environment. In the particular back- ground of cross-domain information exchange, the ... See full document

6

Access control as a service for the Cloud

Access control as a service for the Cloud

... Cloud computing is a technology that offers a cost- effective way for outsourcing data storage and com- putation. Nevertheless, despite its intriguing properties, enterprises are reluctant to fully adopt it, since they ... See full document

15

PARALLEL, DECENTRALIZED AND INDIVIDUAL ACCESSING IN ENCRYPTED CLOUD COMPUTING

PARALLEL, DECENTRALIZED AND INDIVIDUAL ACCESSING IN ENCRYPTED CLOUD COMPUTING

... propose policy primarily based} file access and policy based file assured deletion for higher access to the files and delete the files that are strong-minded not a lot ...renewal ... See full document

5

Security Using Ciphertext Policy Attribute Based Access Control: A Literature Survey.

Security Using Ciphertext Policy Attribute Based Access Control: A Literature Survey.

... Here access structure used are the AND gate of the attribute ...same access structure using AND gate the Original file can get without using private ... See full document

5

Session Based Ciphertext Policy Attribute Based Encryption Method for Access Control in Cloud Storage

Session Based Ciphertext Policy Attribute Based Encryption Method for Access Control in Cloud Storage

... fine-grained access control to encrypted ...user access rights or data access ...of access rights, key refreshing and ...of access rights as well as efficient key refreshing and ... See full document

5

Automatic Generation, Refinement and Analysis of Security Policies.

Automatic Generation, Refinement and Analysis of Security Policies.

... classifies access patterns with no false ...) access patterns and the 72 false-malicious (False-Positive) ones in the final Dec, mainly due to two ...of access patterns are shared by both privileged ... See full document

125

Workflow and Access Control Reloaded: a Declarative Specification Framework for the Automated Analysis of Web Services

Workflow and Access Control Reloaded: a Declarative Specification Framework for the Automated Analysis of Web Services

... the access control rules for each of the four principals involved in the ...the access control relation so as to grant or deny the right to execute a transition to a certain ...the ... See full document

20

Security and privacy requirements analysis tool software requirements specification version 2.00

Security and privacy requirements analysis tool software requirements specification version 2.00

... This section outlines the services to be provided by the tool. Each functional requirement includes: the purpose of the requirement, a brief description, the origin of the requirement and the priority of the requirement. ... See full document

33

ICT enabled participatory urban planning and policy development: The UrbanAPI project

ICT enabled participatory urban planning and policy development: The UrbanAPI project

... interactive control of proposed planning interventions and associated impacts generated by these interventions assists the public interactively engaging in the planning processes and contributing to planning ... See full document

16

Show all 10000 documents...