Sciweavers

89 search results - page 2 / 18
» The Efficient Maintenance of Access Roles with Role Hiding
Sort
View
ISCAPDCS
2004
13 years 6 months ago
A Framework for Role-Based Access Control in Group Communication Systems
In this paper we analyze the requirements access control mechanisms must fulfill in the context of group communication and define a framework for supporting fine-grained access co...
Cristina Nita-Rotaru, Ninghui Li
APNOMS
2006
Springer
13 years 8 months ago
On the Security of Attribute Certificate Structuring for Highly Distributed Computing Environments
For an efficient role based access control using attribute certificate in highly distributed computing environments, we use a technique of structuring role specification certificat...
Soomi Yang
ISORC
2008
IEEE
13 years 11 months ago
MRBAC: Hierarchical Role Management and Security Access Control for Distributed Multimedia Systems
In this paper, a Role-based Access Control (RBAC) model is applied and extended to a multimedia version called Multi-Role Based Access Control (MRBAC), which can fully support the...
Na Zhao, Min Chen, Shu-Ching Chen, Mei-Ling Shyu
SEC
2008
13 years 6 months ago
Role Signatures for Access Control in Open Distributed Systems
Implementing access control efficiently and effectively in an open and distributed system is a challenging problem. One reason for this is that users requesting access to remote re...
Jason Crampton, Hoon Wei Lim
ESORICS
2006
Springer
13 years 8 months ago
Delegation in Role-Based Access Control
User delegation is a mechanism for assigning access rights available to a user to another user. A delegation operation can either be a grant or transfer operation. Delegation for r...
Jason Crampton, Hemanth Khambhammettu