Sciweavers

715 search results - page 1 / 143
» Integration of Access Control in Information Systems: From R...
Sort
View
SACMAT
2003
ACM
13 years 10 months ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
ICWS
2008
IEEE
13 years 6 months ago
A Theory of Role Composition
We study the access control integration problem for web services. Organizations frequently use many services, each with its own access control policies, that must interoperate whi...
Jeffrey Fischer, Rupak Majumdar
ECTEL
2007
Springer
13 years 11 months ago
Role Based Access Control for the Interaction with Search Engines
Search engine-based features are a basic interaction mean for users to find information inside a Web-based Learning Management Systems (LMS); nonetheless, traditional solutions la...
Alessandro Bozzon, Tereza Iofciu, Wolfgang Nejdl, ...
COMSWARE
2007
IEEE
13 years 11 months ago
Role Based Access Control for UDDI Inquiries
— Web Services are commonly used by organizations for B2B integration and enterprise application integration. UDDI registries are widely used as mechanisms for businesses to list...
Raymond Peterkin, Jinsuk Solomon, Dan Ionescu