123
click to vote
SACMAT
15 years 6 months ago
2004 ACM
Emerging trust and risk management systems provide a framework for principals to determine whether they will exchange resources, without requiring a complete definition of their ...
113
click to vote
SACMAT
15 years 6 months ago
2004 ACM
In order to provide a general access control methodology for parts of XML documents, we propose combining rolebased access control as found in the Role Graph Model, with a methodo...
112
click to vote
SACMAT
15 years 6 months ago
2004 ACM
In the era of Ubiquitous Computing and world–wide data transfer mobility, as an innovative aspect of professional activities, imposes new and complex problems of mobile and dist...
111
click to vote
SACMAT
15 years 6 months ago
2004 ACM
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...
106
click to vote
SACMAT
15 years 6 months ago
2004 ACM
We describe a layered approach to access control for distributed and interoperable computing systems. Firstly, compound access control policies are conceptually specified, using ...
|