140
Voted
SACMAT
15 years 7 months ago
2010 ACM
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
135
click to vote
SACMAT
15 years 7 months ago
2010 ACM
Access to distributed databases containing tuples collected about mobile physical objects requires information about the objects’ trajectories. Existing access control models ca...
131
Voted
SACMAT
15 years 18 days ago
2010 ACM
The web is now being used as a general platform for hosting distributed applications like wikis, bulletin board messaging systems and collaborative editing environments. Data from...
116
click to vote
SACMAT
15 years 6 months ago
2010 ACM
There has been increasing interest in automatic techniques for generating roles for role based access control, a process known as role mining. Most role mining approaches assume t...
142
Voted
SACMAT
15 years 18 days ago
2010 ACM
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the administrative and security advantages of RBAC with the dynamic nature of mobile and...
|