Sciweavers

481 search results - page 4 / 97
» Analyzing and Managing Role-Based Access Control Policies
Sort
View
SP
2002
IEEE
200views Security Privacy» more  SP 2002»
13 years 5 months ago
Design of a Role-Based Trust-Management Framework
We introduce the RT framework, a family of Rolebased Trust-management languages for representing policies and credentials in distributed authorization. RT combines the strengths o...
Ninghui Li, John C. Mitchell, William H. Winsborou...
POLICY
2001
Springer
13 years 10 months ago
Translating Role-Based Access Control Policy within Context
Jean Bacon, Michael Lloyd, Ken Moody
JHSN
2006
100views more  JHSN 2006»
13 years 5 months ago
Reconfiguring Role Based Access Control policies using risk semantics
We present a refined model for Role Based Access Control policies and define a risk measure for the model, which expresses elements of the operational, combinatorial and conflict ...
Benjamin Aziz, Simon N. Foley, John Herbert, Garre...
ECOOPW
1998
Springer
13 years 9 months ago
Role-Based Protection and Delegation for Mobile Object Environments
PrincipalDomain is an administrative scoping construct for establishing security policies based on the principals invoking object services that may entail objects moving around a ...
Nataraj Nagaratnam, Doug Lea
RBAC
1997
234views more  RBAC 1997»
13 years 7 months ago
Comparing simple role based access control models and access control lists
The RBAC metaphor is powerful in its ability to express access control policy in terms of the way in which administrators view organizations. The functionality of simple Role Base...
John F. Barkley