Sciweavers

SACMAT
2010
ACM
13 years 2 months ago
Role mining based on weights
Role mining from the existing permissions has been widely applied to aid the process of migrating to an RBAC system. While all permissions are treated evenly in previous approache...
Xiaopu Ma, Ruixuan Li, Zhengding Lu
SACMAT
2010
ACM
13 years 2 months ago
Enforcing spatial constraints for mobile RBAC systems
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the administrative and security advantages of RBAC with the dynamic nature of mobile and...
Michael S. Kirkpatrick, Elisa Bertino
SACMAT
2010
ACM
13 years 2 months ago
An architecture for enforcing end-to-end access control over web applications
The web is now being used as a general platform for hosting distributed applications like wikis, bulletin board messaging systems and collaborative editing environments. Data from...
Boniface Hicks, Sandra Rueda, Dave King 0002, Thom...
SACMAT
2010
ACM
13 years 4 months ago
On the definition of role mining
There have been many approaches proposed for role mining. However, the problems solved often differ due to a lack of consensus on the formal definition of the role mining problem....
Mario Frank, Joachim M. Buhmann, David A. Basin
SACMAT
2010
ACM
13 years 9 months ago
Mining roles with noisy data
There has been increasing interest in automatic techniques for generating roles for role based access control, a process known as role mining. Most role mining approaches assume t...
Ian Molloy, Ninghui Li, Yuan (Alan) Qi, Jorge Lobo...
SACMAT
2010
ACM
13 years 9 months ago
Towards analyzing complex operating system access control configurations
Hong Chen, Ninghui Li, Christopher S. Gates, Ziqin...
SACMAT
2010
ACM
13 years 9 months ago
Monitoring security policies with metric first-order temporal logic
We show the practical feasibility of monitoring complex security properties using a runtime monitoring approach for metric first-order temporal logic. In particular, we show how ...
David A. Basin, Felix Klaedtke, Samuel Müller
SACMAT
2010
ACM
13 years 9 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
SACMAT
2010
ACM
13 years 9 months ago
A model of triangulating environments for policy authoring
Policy authors typically reconcile several different mental models and goals, such as enabling collaboration, securing information, and conveying trust in colleagues. The data un...
Kathi Fisler, Shriram Krishnamurthi
SACMAT
2010
ACM
13 years 9 months ago
Role updating for assignments
The role-based access control (RBAC) has significantly simplified the management of users and permissions in computing systems. In dynamic environments, systems are usually unde...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu