Sciweavers

EKAW
2010
Springer
13 years 3 months ago
Social People-Tagging vs. Social Bookmark-Tagging
Abstract. Tagging has been widely used and studied in various domains. Recently, people-tagging has emerged as a means to categorize contacts, and is also used in some social acces...
Peyman Nasirifard, Sheila Kinsella, Krystian Samp,...
ISI
2006
Springer
13 years 4 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
DBSEC
2009
110views Database» more  DBSEC 2009»
13 years 6 months ago
Distributed Privilege Enforcement in PACS
Abstract. We present a new access control mechanism for P2P networks with distributed enforcement, called P2P Access Control System (PACS). PACS enforces powerful access control mo...
Christoph Sturm, Ela Hunt, Marc H. Scholl
IWFM
2000
167views Formal Methods» more  IWFM 2000»
13 years 6 months ago
An Algebraic Basis for Specifying and Enforcing Access Control in Security Systems
Security services in a multi-user environment are often based on access control mechanisms. Static of an access control policy can be formalised using abstract algebraic models. W...
Claus Pahl
ISCAPDCS
2004
13 years 6 months ago
A Framework for Role-Based Access Control in Group Communication Systems
In this paper we analyze the requirements access control mechanisms must fulfill in the context of group communication and define a framework for supporting fine-grained access co...
Cristina Nita-Rotaru, Ninghui Li
ECSCW
2001
13 years 6 months ago
Team automata for spatial access control
Abstract. Team automata provide a framework for capturing notions like coordination, colon, and cooperation in distributed systems. They consist of an abstract specification of com...
Maurice H. ter Beek, Clarence A. Ellis, Jetty Klei...
DBSEC
2008
107views Database» more  DBSEC 2008»
13 years 6 months ago
Regulating Exceptions in Healthcare Using Policy Spaces
One truth holds for the healthcare industry - nothing should interfere with the delivery of care. Given this fact, the access control mechanisms used in healthcare to regulate and ...
Claudio Agostino Ardagna, Sabrina De Capitani di V...
COMPSAC
2007
IEEE
13 years 8 months ago
Conformance Checking of Access Control Policies Specified in XACML
Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to whi...
Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie
IH
1998
Springer
13 years 9 months ago
The Steganographic File System
Abstract. Users of some systems are at risk of being compelled to disclose their keys or other private data, and this risk could be mitigated if access control mechanisms supported...
Ross J. Anderson, Roger M. Needham, Adi Shamir
MMMACNS
2001
Springer
13 years 9 months ago
The Set and Function Approach to Modeling Authorization in Distributed Systems
Abstract. We present a new model that provides clear and precise semantics for authorization. The semantics is independent from underling security mechanisms and is separate from i...
Tatyana Ryutov, B. Clifford Neuman