Sciweavers

30 search results - page 3 / 6
» A model of triangulating environments for policy authoring
Sort
View
NBIS
2007
Springer
13 years 12 months ago
Trust Model for Mobile Devices in Ubiquitous Environment
In ubiquitous computing environment, people carrying their mobile devices (eg., mobile phone, PDA, embedded devices) expect to access locally hosted services or resources anytime, ...
Zhefan Jiang, Sangwook Kim
ACSAC
2002
IEEE
13 years 10 months ago
A Model for Attribute-Based User-Role Assignment
The Role-Based Access Control (RBAC) model is traditionally used to manually assign users to appropriate roles, based on a specific enterprise policy, thereby authorizing them to ...
Mohammad A. Al-Kahtani, Ravi S. Sandhu
APWEB
2008
Springer
13 years 6 months ago
Protecting Information Sharing in Distributed Collaborative Environment
Abstract. Information sharing on distributed collaboration usually occurs in broad, highly dynamic network-based environments, and formally accessing the resources in a secure mann...
Min Li, Hua Wang
SACMAT
2003
ACM
13 years 11 months ago
An access control model for dynamic client-side content
The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resource...
Adam Hess, Kent E. Seamons
JASIS
2007
119views more  JASIS 2007»
13 years 5 months ago
Visualization of the citation impact environments of scientific journals: An online mapping exercise
Aggregated journal-journal citation networks based on the Journal Citation Reports 2004 of the Science Citation Index (5968 journals) and the Social Science Citation Index (1712 j...
Loet Leydesdorff