Sciweavers

76 search results - page 2 / 16
» A tool for role-based chatting
Sort
View
COMPSAC
2003
IEEE
13 years 10 months ago
A Role-Based Metamodeling Approach to Specifying Design Patterns
Design patterns describe solutions to recurring design problems in the development of software designs. To encourage the use of design patterns, we are investigating tool support ...
Dae-Kyoo Kim, Robert B. France, Sudipto Ghosh, Eun...
ISSTA
2006
ACM
13 years 11 months ago
Role-Based access control consistency validation
Modern enterprise systems support Role-Based Access Control (RBAC). Although RBAC allows restricting access to privileged operations, a deployer may actually intend to restrict ac...
Paolina Centonze, Gleb Naumovich, Stephen J. Fink,...
ACSAC
2002
IEEE
13 years 10 months ago
Advanced Features for Enterprise-Wide Role-Based Access Control
The administration of users and access rights in large enterprises is a complex and challenging task. Roles are a powerful concept for simplifying access control, but their implem...
Axel Kern
ACSAC
1998
IEEE
13 years 9 months ago
Role-Based Access Control Framework for Network Enterprises
A business's success depends on its ability to protect valuable business assets in an increasingly hostile environment. Protecting information requires a cost, not only in pu...
D. J. Thomsen, D. O'Brien, J. Bogle
TDSC
2008
152views more  TDSC 2008»
13 years 5 months ago
Towards Formal Verification of Role-Based Access Control Policies
Specifying and managing access control policies is a challenging problem. We propose to develop formal verification techniques for access control policies to improve the current s...
Somesh Jha, Ninghui Li, Mahesh V. Tripunitara, Qih...