Sciweavers

44 search results - page 3 / 9
» How to Securely Break into RBAC: The BTG-RBAC Model
Sort
View
WORDS
2002
IEEE
13 years 11 months ago
Role-Based Access Control for CORBA Distributed Object Systems
This paper shows how role-based access control (RBAC) models can be implemented in distributed object-based systems that follow OMG/CORBA standards. We introduce a novel approach ...
Rafael R. Obelheiro, Joni da Silva Fraga
ICDE
2007
IEEE
164views Database» more  ICDE 2007»
14 years 14 days ago
Multi-session Separation of Duties (MSoD) for RBAC
Separation of duties (SoD) is a key security requirement for many business and information systems. Role Based Access Controls (RBAC) is a relatively new paradigm for protecting i...
David W. Chadwick, Wensheng Xu, Sassa Otenko, Roma...
WEBI
2004
Springer
13 years 11 months ago
An Access Control Model for Web Services in Business Process
Business process describes a set of services that span enterprise boundaries and are provided by enterprises that see each other as partners. Web services is widely accepted and a...
Peng Liu, Zhong Chen
DBSEC
2006
122views Database» more  DBSEC 2006»
13 years 7 months ago
Term Rewriting for Access Control
We demonstrate how access control models and policies can be represented by using term rewriting systems, and how rewriting may be used for evaluating access requests and for provi...
Steve Barker, Maribel Fernández
CORR
2010
Springer
102views Education» more  CORR 2010»
13 years 6 months ago
How to prevent type-flaw and multi-protocol attacks on security protocols under Exclusive-OR
Type-flaw attacks and multi-protocol attacks on security protocols have been frequently reported in the literature. Heather et al. and Guttman et al. proved that these could be pr...
Sreekanth Malladi