Sciweavers

41 search results - page 1 / 9
» Role-based control of shared application views
Sort
View
WETICE
1997
IEEE
13 years 9 months ago
How Role Based Access Control is Implemented in SESAME
In this paper we want to share our experiences with implementing a scheme that enforces role based access control in a distributed, heterogeneous computing environment. This work ...
Mark Vandenwauver, René Govaerts, Joos Vand...
COORDINATION
2005
Springer
13 years 10 months ago
Coordination Systems in Role-Based Adaptive Software
Software systems are becoming more open, distributed, pervasive, and connected. In such systems, the relationships between loosely-coupled application elements become non-determini...
Alan W. Colman, Jun Han
ISI
2004
Springer
13 years 10 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
UIST
2005
ACM
13 years 10 months ago
Role-based control of shared application views
Lior Berry, Lyn Bartram, Kellogg S. Booth
SIGMOD
2007
ACM
161views Database» more  SIGMOD 2007»
14 years 5 months ago
Homeviews: peer-to-peer middleware for personal data sharing applications
This paper presents HomeViews, a peer-to-peer middleware system for building personal data management applications. HomeViews provides abstractions and services for data organizat...
Roxana Geambasu, Magdalena Balazinska, Steven D. G...