Sciweavers

1521 search results - page 1 / 305
» Role analysis
Sort
View
POPL
2002
ACM
14 years 5 months ago
Role analysis
We present a new role system in which the type (or role) of each object depends on its referencing relationships with other objects, with the role changing as these relationships ...
Viktor Kuncak, Patrick Lam, Martin C. Rinard
FOMI
2008
13 years 6 months ago
Roles: A Four-Dimensional Analysis
In ontology the underlying nature of things is sought. Thus it is that the roles things play can sometimes be neglected. Some different sorts of things that get called roles: place...
Matthew West
ACSAC
2009
IEEE
13 years 2 months ago
RoleVAT: Visual Assessment of Practical Need for Role Based Access Control
Abstract--Role based access control (RBAC) is a powerful security administration concept that can simplify permission assignment management. Migration to and maintenance of RBAC re...
Dana Zhang, Kotagiri Ramamohanarao, Steven Verstee...
CCS
2006
ACM
13 years 8 months ago
RoleMiner: mining roles using subset enumeration
Role engineering, the task of defining roles and associating permissions to them, is essential to realize the full benefits of the role-based access control paradigm. Essentially,...
Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warne...
SACMAT
2010
ACM
13 years 5 months ago
On the definition of role mining
There have been many approaches proposed for role mining. However, the problems solved often differ due to a lack of consensus on the formal definition of the role mining problem....
Mario Frank, Joachim M. Buhmann, David A. Basin