Sciweavers

116 search results - page 3 / 24
» Secure Role-Based Workflow Models
Sort
View
ACSAC
2001
IEEE
13 years 9 months ago
Detecting Conflicts in a Role-Based Delegation Model
The RBAC96 access control model has been the basis for extensive work on role-based constraint specification and role-based delegation. However, these practical extensions can als...
Andreas Schaad
UML
2005
Springer
13 years 11 months ago
A Formal Enforcement Framework for Role-Based Access Control Using Aspect-Oriented Programming
Many of today’s software applications require a high-level of security, defined by a detailed policy and attained via mechanisms such as role-based access control (RBAC), mandat...
Jaime A. Pavlich-Mariscal, Laurent Michel, Steven ...
ACSAC
2004
IEEE
13 years 9 months ago
Role-Based Delegation Model/ Hierarchical Roles (RBDM1)
The basic idea behind delegation is that some active entity in a system delegates authority to another active entity in order to carry out some functions on behalf of the former. ...
Ezedin Barka, Ravi S. Sandhu
DBSEC
2008
188views Database» more  DBSEC 2008»
13 years 7 months ago
On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model
With the growing use of wireless networks and mobile devices, we are moving towards an era where spatial and temporal information will be necessary for access control. The use of s...
Manachai Toahchoodee, Indrakshi Ray
SEC
2007
13 years 7 months ago
Extending Role Based Access Control Model for Distributed Multidomain Applications
This paper presents the results related to the development of a flexible domain-based access control infrastructure for distributed Grid-based Collaborative Environments and Comple...
Yuri Demchenko, Leon Gommans, Cees de Laat