Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,160,426 papers from all fields of science
Search
Sign In
Create Free Account
Cross-domain solution
Known as:
Cross-domain access
, CDS
, Cross domain guard
Expand
A cross-domain solution (CDS) is a means of information assurance that provides the ability to manually or automatically access or transfer…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
16 relations
Antivirus software
Automated information system
Bell–LaPadula model
Clark–Wilson model
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Interactive Transfer Learning in Relational Domains
Raksha Kumaraswamy
,
Nandini Ramanan
,
Phillip Odom
,
Sriraam Natarajan
KI - Künstliche Intelligenz
2020
Corpus ID: 218561764
We consider the problem of interactive transfer learning where a human expert provides guidance to the transfer learning…
Expand
2016
2016
Weighted pseudo almost automorphic and S-asymptotically ω-periodic solutions to fractional difference-differential equations
E. Alvarez
,
C. Lizama
2016
Corpus ID: 42393018
We study weighted pseudo almost automorphic solutions for the nonlinear fractional difference equation ∆u(n) = Au(n+ 1) + f(n, u…
Expand
2011
2011
An empirical study on the security of cross-domain policies in rich internet applications
Georgios Kontaxis
,
Demetres Antoniades
,
Iasonas Polakis
,
E. Markatos
European Workshop on System Security
2011
Corpus ID: 1233884
Adobe Flash and Microsoft Silverlight are two widely adopted platforms for providing Rich Internet Applications (RIA) over the…
Expand
2010
2010
Attribute-based universal access control framework in open network environment
Hou Su-juan
2010
Corpus ID: 62903358
Concerning the limitations of the application of traditional access control model in new generation credible Internet environment…
Expand
2010
2010
Web Services Security Policy
Yongsheng Zhang
,
Cuicui Sun
,
Yang Jing
,
Wang Ying
International Conference on Multimedia…
2010
Corpus ID: 9068732
Security has become an important issue in Web Services application, which has been widely concerned. This paper introduces…
Expand
2010
2010
A Trust Aware Grid Access Control Architecture Based on ABAC
Tiezhu Zhao
,
Shoubin Dong
IEEE Fifth International Conference on Networking…
2010
Corpus ID: 9600191
Grid system has many great security challenges such as access control. The attribute-based access control model (ABAC) has much…
Expand
2010
2010
Attribute mapping for cross-domain access control
Yihong Long
,
Zhihong Tang
,
Xu Liu
International Conference on Computer and…
2010
Corpus ID: 15357861
Role mapping theory is an attracting approach for cross-domain authorization (access control). However, it is only applicable to…
Expand
2006
2006
Lessons Learned Developing Cross- Domain Solutions on SELinux
Karl MacMillan
,
Spencer R. Shimko
,
Chad T. Sellers
,
F. Mayer
,
Art Wilson
2006
Corpus ID: 54593921
Building computer systems that allow the controlled transfer of data between security domains, commonly called cross-domain…
Expand
2006
2006
Integrating Multilevel Command and Control into a Service Oriented Architecture to Provide Cross Domain Capability
Christopher J. Raney
2006
Corpus ID: 44351511
Abstract : Information superiority, the capability to collect, process, and disseminate an uninterrupted flow of information, is…
Expand
2005
2005
A Mobile Access Control Architecture for Multiple Security Domains Environment
Ye Tang
,
Shensheng Zhang
,
Lei Li
2005
Corpus ID: 59541680
The characteristics of multiple security domains environment include multifactor, dynamic, heterogeneity, and openness, which…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE