Sciweavers

445 search results - page 2 / 89
» Authorization and Access Control in IRO-DB
Sort
View
EDBT
2006
ACM
177views Database» more  EDBT 2006»
14 years 5 months ago
Authorization-Transparent Access Control for XML Under the Non-Truman Model
In authorization-transparent access control, users formulate their queries against the database schema rather than against authorization views that transform and hide data. The Tru...
Alberto O. Mendelzon, Renée J. Miller, Yaro...
JSW
2007
106views more  JSW 2007»
13 years 5 months ago
Supporting Attribute-based Access Control in Authorization and Authentication Infrastructures with Ontologies
Abstract— In highly open systems like the Internet, attributebased access control (ABAC) has proven its appropriateness. This is reflected in the utilization of ABAC in authenti...
Torsten Priebe, Wolfgang Dobmeier, Christian Schl&...
IASTEDSE
2004
13 years 7 months ago
An authorization and access control scheme for pervasive computing
The existence of a central security authority is too restrictive for pervasive computing environments. Existing distributed security schemes fail in a pervasive computing environm...
Linda Staffans, Titos Saridakis
ICDE
1996
IEEE
178views Database» more  ICDE 1996»
14 years 7 months ago
Authorization and Access Control in IRO-DB
A. Min Tjoa, Fritz Kastner, Günther Pernul, S...
WETICE
1998
IEEE
13 years 10 months ago
Authorization and Attribute Certificates for Widely Distributed Access Control
We describe a system whose purpose is to explore the use of certificates for the distributed management of access rights for resources that have multiple, independent, and geograp...
William E. Johnston, Srilekha Mudumbai, Mary R. Th...