Sciweavers

SACMAT
2004
ACM
13 years 10 months ago
Security analysis in role-based access control
Ninghui Li, Mahesh V. Tripunitara
SACMAT
2004
ACM
13 years 10 months ago
Administrative scope in the graph-based framework
Manuel Koch, Luigi V. Mancini, Francesco Parisi-Pr...
SACMAT
2004
ACM
13 years 10 months ago
Role-based access control in ambient and remote space
In the era of Ubiquitous Computing and world–wide data transfer mobility, as an innovative aspect of professional activities, imposes new and complex problems of mobile and dist...
Horst Wedde, Mario Lischka
SACMAT
2004
ACM
13 years 10 months ago
A role-based approach to access control for XML databases
In order to provide a general access control methodology for parts of XML documents, we propose combining rolebased access control as found in the Role Graph Model, with a methodo...
Jingzhu Wang, Sylvia L. Osborn
SACMAT
2004
ACM
13 years 10 months ago
Implementing access control to people location information
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...
Urs Hengartner, Peter Steenkiste
SACMAT
2004
ACM
13 years 10 months ago
Role-based cascaded delegation
We propose role-based cascaded delegation, a model for delegation of authority in decentralized trust management systems. We show that role-based cascaded delegation combines the ...
Roberto Tamassia, Danfeng Yao, William H. Winsboro...
SACMAT
2004
ACM
13 years 10 months ago
Using trust and risk in role-based access control policies
Emerging trust and risk management systems provide a framework for principals to determine whether they will exchange resources, without requiring a complete definition of their ...
Nathan Dimmock, András Belokosztolszki, Dav...
SACMAT
2004
ACM
13 years 10 months ago
Towards a credential-based implementation of compound access control policies
We describe a layered approach to access control for distributed and interoperable computing systems. Firstly, compound access control policies are conceptually specified, using ...
Joachim Biskup, Sandra Wortmann
SACMAT
2004
ACM
13 years 10 months ago
X-GTRBAC admin: a decentralized administration model for enterprise wide access control
Access control in enterprises is a key research area in the realm of Computer Security because of the unique needs of the target enterprise. As the enterprise typically has large ...
Rafae Bhatti, James Joshi, Elisa Bertino, Arif Gha...
SACMAT
2004
ACM
13 years 10 months ago
Using uml to visualize role-based access control constraints
Indrakshi Ray, Na Li, Robert B. France, Dae-Kyoo K...