Sciweavers

26 search results - page 4 / 6
» The management of users, roles, and permissions in JDOSecure
Sort
View
SACMAT
2006
ACM
13 years 11 months ago
Fine-grained role-based delegation in presence of the hybrid role hierarchy
Delegation of authority is an important process that needs to be captured by any access control model. In role-based access control models, delegation of authority involves delega...
James B. D. Joshi, Elisa Bertino
DIM
2005
ACM
13 years 7 months ago
A delegation framework for federated identity management
Identity federation is a powerful scheme that links accounts of users maintained distinctly by different business partners. The concept of network identity is a driver for accele...
Hidehito Gomi, Makoto Hatakeyama, Shigeru Hosono, ...
DBSEC
2010
152views Database» more  DBSEC 2010»
13 years 7 months ago
Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems
Abstract. We present a modelling language, called X-Policy, for webbased collaborative systems with dynamic access control policies. The access to resources in these systems depend...
Hasan Qunoo, Mark Ryan
SACMAT
2009
ACM
14 years 7 days ago
Symbolic reachability analysis for parameterized administrative role based access control
Role based access control (RBAC) is a widely used access control paradigm. In large organizations, the RBAC policy is managed by multiple administrators. An administrative role ba...
Scott D. Stoller, Ping Yang, Mikhail I. Gofman, C....
DEXAW
1998
IEEE
94views Database» more  DEXAW 1998»
13 years 10 months ago
Towards Access Control for Logical Document Structures
This paper presents a first step towards a security model that defines access control for logical document structures. el benefits from roles to abstract from users and from secur...
Fredj Dridi, Gustaf Neumann