Sciweavers

29 search results - page 5 / 6
» An Activity-Based Model for Separation of Duty
Sort
View
SACMAT
2009
ACM
14 years 16 days ago
Supporting RBAC with XACML+OWL
XACML does not natively support RBAC and even the specialized XACML profiles are not able to support many relevant constraints such as static and dynamic separation of duty. Exte...
Rodolfo Ferrini, Elisa Bertino
JWSR
2008
145views more  JWSR 2008»
13 years 6 months ago
An Access-Control Framework for WS-BPEL
Business processes, the next-generation workflows, have attracted considerable research interest in the last 15 years. More recently, several XML-based languages have been propose...
Federica Paci, Elisa Bertino, Jason Crampton
ISI
2004
Springer
13 years 11 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
ESORICS
2008
Springer
13 years 7 months ago
On the Security of Delegation in Access Control Systems
Delegation is a mechanism that allows a user A to act on another user B's behalf by making B's access rights available to A. It is well recognized as an important mechani...
Qihua Wang, Ninghui Li, Hong Chen
CONCURRENCY
2008
104views more  CONCURRENCY 2008»
13 years 6 months ago
PERMIS: a modular authorization infrastructure
Authorization infrastructures manage privileges and render access control decisions, allowing applications to adjust their behavior according to the privileges allocated to users....
David W. Chadwick, Gansen Zhao, Sassa Otenko, Roma...