134
click to vote
SACMAT
15 years 6 months ago
2010 ACM
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
131
click to vote
SACMAT
15 years 6 months ago
2010 ACM
Access to distributed databases containing tuples collected about mobile physical objects requires information about the objects’ trajectories. Existing access control models ca...
123
click to vote
SACMAT
14 years 11 months ago
2010 ACM
The web is now being used as a general platform for hosting distributed applications like wikis, bulletin board messaging systems and collaborative editing environments. Data from...
109
click to vote
SACMAT
15 years 5 months ago
2010 ACM
There has been increasing interest in automatic techniques for generating roles for role based access control, a process known as role mining. Most role mining approaches assume t...
129
click to vote
SACMAT
14 years 11 months ago
2010 ACM
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the administrative and security advantages of RBAC with the dynamic nature of mobile and...
|