Sciweavers

33 search results - page 2 / 7
» Specifying Process-Aware Access Control Rules in SBVR
Sort
View
ICEBE
2009
IEEE
157views Business» more  ICEBE 2009»
13 years 2 months ago
Trust-Based Access Control for Privacy Protection in Collaborative Environment
Privacy has been acknowledged to be a critical requirement for many business environments. A variety of uncertainty and mutability poses challenges when sharing resources must happ...
Min Li, Hua Wang, David Ross
CORR
2006
Springer
113views Education» more  CORR 2006»
13 years 5 months ago
Event Systems and Access Control
Abstract. We consider the interpretations of notions of access control (permissions, interdictions, obligations, and user rights) as run-time properties of information systems spec...
Dominique Méry, Stephan Merz
EDBT
2006
ACM
177views Database» more  EDBT 2006»
14 years 5 months ago
Authorization-Transparent Access Control for XML Under the Non-Truman Model
In authorization-transparent access control, users formulate their queries against the database schema rather than against authorization views that transform and hide data. The Tru...
Alberto O. Mendelzon, Renée J. Miller, Yaro...
CSFW
2010
IEEE
13 years 9 months ago
Constraining Credential Usage in Logic-Based Access Control
—Authorization logics allow concise specification of flexible access-control policies, and are the basis for logic-based access-control systems. In such systems, resource owner...
Lujo Bauer, Limin Jia, Divya Sharma
AIIA
2005
Springer
13 years 7 months ago
Argumentation for Access Control
In this paper we are interested in argument based reasoning for access control, for example in the context of agents negotiating access to resources or web services in virtual orga...
Guido Boella, Joris Hulstijn, Leendert W. N. van d...