152
click to vote
SACMAT
15 years 8 months ago
2010 ACM
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
155
Voted
SACMAT
15 years 8 months ago
2010 ACM
Access to distributed databases containing tuples collected about mobile physical objects requires information about the objects’ trajectories. Existing access control models ca...
151
Voted
SACMAT
15 years 2 months ago
2010 ACM
The web is now being used as a general platform for hosting distributed applications like wikis, bulletin board messaging systems and collaborative editing environments. Data from...
133
click to vote
SACMAT
15 years 8 months ago
2010 ACM
There has been increasing interest in automatic techniques for generating roles for role based access control, a process known as role mining. Most role mining approaches assume t...
156
Voted
SACMAT
15 years 2 months ago
2010 ACM
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the administrative and security advantages of RBAC with the dynamic nature of mobile and...
|