Sciweavers

78 search results - page 16 / 16
» Modeling Role-Based Access Control Using Parameterized UML M...
Sort
View
ACSAC
2005
IEEE
13 years 10 months ago
Intrusion Detection in RBAC-administered Databases
A considerable effort has been recently devoted to the development of Database Management Systems (DBMS) which guarantee high assurance security and privacy. An important componen...
Elisa Bertino, Ashish Kamra, Evimaria Terzi, Athen...
ISN
1999
Springer
159views Communications» more  ISN 1999»
13 years 9 months ago
Accounting Management in a TINA-Based Service and Network Environment
The ACTS FlowThru project aims to build a management system which supports the flow of management information across organisational and technological domains by reusing components ...
Patrick Hellemans, Cliff Redmond, Koen Daenen, Dav...
ESORICS
2007
Springer
13 years 8 months ago
Satisfiability and Resiliency in Workflow Systems
We propose the role-and-relation-based access control (R2 BAC) model for workflow systems. In R2 BAC, in addition to a user's role memberships, the user's relationships w...
Qihua Wang, Ninghui Li