132
click to vote
SACMAT
15 years 6 months ago
2003 ACM
The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resource...
102
click to vote
SACMAT
15 years 6 months ago
2003 ACM
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
123
click to vote
SACMAT
15 years 6 months ago
2003 ACM
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
119
click to vote
SACMAT
15 years 6 months ago
2003 ACM
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
SACMAT
15 years 6 months ago
2003 ACM
The Role-Based Access Control (RBAC) model is traditionally used to manually assign users to appropriate roles. When the service-providing enterprise has a massive customer base, ...
|