• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 3,252
Next 10 →

Table 3. Permission management virtual permissions

in The Newton MessagePad Personal Digital Assistant
by unknown authors
"... In PAGE 6: ... Figure 5 shows the effect we would like to achieve: each physical sub-page is associated with a single virtual address. Table3 shows how permissions are manipulated to assure the one-to-one relationship required for proper sub-page storage management. The table shows four mappings to the same physical page and their associated permissions.... ..."

Table 3. Permission management virtual permissions

in The Newton Operating System
by Robert Welland, Greg Seitz, Lieh-Wuu Wang, Landon Dyer, On Dyer, Tim Harrington, Daniel Culbert
"... In PAGE 6: ... Figure 5 shows the effect we would like to achieve: each physical sub-page is associated with a single virtual address. Table3 shows how permissions are manipulated to assure the one-to-one relationship required for proper sub-page storage management. The table shows four mappings to the same physical page and their associated permissions.... ..."

Table 1: Permission assignments for the example. Role Permissions

in SESAME: Scalable,Environment Sensitive Access Management Engine
by Guangsen Zhang, Manish Parashar
"... In PAGE 17: ... lt;POLICY gt; lt;SUBJECTID gt;gszhang lt;/SUBJECTID gt; lt;BEGIN_ROLE gt;Super User lt;/BEGIN_ROLE gt; lt;EVENT gt;Unsecure Link lt;/EVENT gt; lt;END_ROLE gt;General User lt;/END_ROLE gt; lt;/POLICY gt; lt;/ROLE_TRANSITION gt; Figure 8: Sample RoleTransition policy in XML implementation, consider a simple example with a single user with three roles and a Grid resource with three permissions, as shown in Table1 and Table 2 respectively. The role and permission hierarchies for this example are shown in Figure 9.... ..."

Table 3. Axioms for permission

in Modeling Security Requirements through Ownership, Permission and Delegation
by Paolo Giorgini, Fabio Massacci, John Mylopoulos 2005
"... In PAGE 6: ... In this way, confident(owner, a, s) holds if owner a is confident to give the permission on service s only to trusted actors. Table3 presents the axioms for permission. P1 and P2 build a delegation chain of permission; P3 and P4 build a trust chain for permission; P5 builds trust chains over mon- itoring steps.... ..."
Cited by 27

Table 1. Examples of permissions.

in Here's Your Lego™ Security Kit: How to Give Developers All Protection Mechanisms They Will Ever Need
by Konstantin Beznosov
"... In PAGE 6: ... A permission is constructed out of four distinct elements, as shown in Figure 3. Examples are provided in Table1 at the end of this subsection. Fig.... ..."

Table Stack Permissions

in Mondrian memory protection
by Krste Asanović, Emmett Jethro Witchel, Emmett Jethro Witchel 2002
Cited by 52

Table 1. Permission relation

in Weak Sequential Composition in Process Algebras
by Arend Rensink And, Arend Rensink, Heike Wehrheim 1994
Cited by 13

Table Stack Permissions

in Mondrix: Memory isolation for Linux using Mondriaan memory protection
by Emmett Witchel, Krste Asanović 2005
Cited by 4

Table Stack Permissions

in Mondrix: Memory isolation for Linux using Mondriaan memory protection
by Emmett Witchel, Junghwan Rhee, Krste Asanović 2005
Cited by 4

Table 3. Access Permissions

in unknown title
by unknown authors 1998
Next 10 →
Results 1 - 10 of 3,252
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University