The information on the web is growing at a very fast pace. In this ever-accumulating data, the volume of information represented in XML format is on the rise in recent times. An o...
Abhilash Gummadi, Jong P. Yoon, Biren Shah, Vijay ...
Role-based access control (RBAC) is recognized as an efficient access control model for large organizations. Most organizations have some business rules related to access control...
A Generalized Temporal Role Based Access Control (GTRBAC) model that captures an exhaustive set of temporal constraint needs for access control has recently been proposed. GTRBAC...
James Joshi, Basit Shafiq, Arif Ghafoor, Elisa Ber...
The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resource...
Traditional access control mechanisms rely on a reference monitor to mediate access to protected resources. Reference monitors are inherently centralized and existing attempts to ...
We investigate the cost of changing access control policies dynamically as a response action in computer network defense. We compare and contrast the use of access lists and capab...
The Role-Based Access Control (RBAC) model is traditionally used to manually assign users to appropriate roles. When the service-providing enterprise has a massive customer base, ...
Research into publish/subscribe messaging has so far done little to propose architectures for the support of access control, yet this will be an increasingly critical requirement ...
Access control is one of the most important issue with ubiquitous networking environment. Traditional access control methods are mainly considering authentication of registered us...
Role-based access control has been a focal area for many security researchers over the last decade. There have been a large number of models, and many rich specification language...