Results 1 - 10
of
3,252
Table 3. Permission management virtual permissions
"... In PAGE 6: ... Figure 5 shows the effect we would like to achieve: each physical sub-page is associated with a single virtual address. Table3 shows how permissions are manipulated to assure the one-to-one relationship required for proper sub-page storage management. The table shows four mappings to the same physical page and their associated permissions.... ..."
Table 3. Permission management virtual permissions
"... In PAGE 6: ... Figure 5 shows the effect we would like to achieve: each physical sub-page is associated with a single virtual address. Table3 shows how permissions are manipulated to assure the one-to-one relationship required for proper sub-page storage management. The table shows four mappings to the same physical page and their associated permissions.... ..."
Table 1: Permission assignments for the example. Role Permissions
"... In PAGE 17: ... lt;POLICY gt; lt;SUBJECTID gt;gszhang lt;/SUBJECTID gt; lt;BEGIN_ROLE gt;Super User lt;/BEGIN_ROLE gt; lt;EVENT gt;Unsecure Link lt;/EVENT gt; lt;END_ROLE gt;General User lt;/END_ROLE gt; lt;/POLICY gt; lt;/ROLE_TRANSITION gt; Figure 8: Sample RoleTransition policy in XML implementation, consider a simple example with a single user with three roles and a Grid resource with three permissions, as shown in Table1 and Table 2 respectively. The role and permission hierarchies for this example are shown in Figure 9.... ..."
Table 3. Axioms for permission
2005
"... In PAGE 6: ... In this way, confident(owner, a, s) holds if owner a is confident to give the permission on service s only to trusted actors. Table3 presents the axioms for permission. P1 and P2 build a delegation chain of permission; P3 and P4 build a trust chain for permission; P5 builds trust chains over mon- itoring steps.... ..."
Cited by 27
Table 1. Examples of permissions.
in Here's Your Lego™ Security Kit: How to Give Developers All Protection Mechanisms They Will Ever Need
"... In PAGE 6: ... A permission is constructed out of four distinct elements, as shown in Figure 3. Examples are provided in Table1 at the end of this subsection. Fig.... ..."
Table Stack Permissions
2005
Cited by 4
Table Stack Permissions
2005
Cited by 4
Results 1 - 10
of
3,252