Sciweavers

635 search results - page 4 / 127
» A Context-Sensitive Access Control Model and Prototype Imple...
Sort
View
SIGMOD
2006
ACM
124views Database» more  SIGMOD 2006»
14 years 6 months ago
Redundancy and information leakage in fine-grained access control
The current SQL standard for access control is coarse grained, in that it grants access to all rows of a table or none. Fine-grained access control, which allows control of access...
Govind Kabra, Ravishankar Ramamurthy, S. Sudarshan
SPC
2005
Springer
13 years 11 months ago
TrustAC: Trust-Based Access Control for Pervasive Devices
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...
Florina Almenárez Mendoza, Andrés Ma...
ITCC
2005
IEEE
13 years 12 months ago
Formalisation and implementation of Access control models
Access control software must be based on a security policy model. Flaws in them may come from a lack of precision or some incoherences in the policy model or from inconsistencies ...
Mathieu Jaume, Charles Morisset
SACMAT
2004
ACM
13 years 11 months ago
Using trust and risk in role-based access control policies
Emerging trust and risk management systems provide a framework for principals to determine whether they will exchange resources, without requiring a complete definition of their ...
Nathan Dimmock, András Belokosztolszki, Dav...
DBSEC
2007
131views Database» more  DBSEC 2007»
13 years 7 months ago
Dynamic Event-Based Access Control as Term Rewriting
Abstract. Despite the widespread adoption of Role-based Access Control (RBAC) models, new access control models are required for new applications for which RBAC may not be especial...
Clara Bertolissi, Maribel Fernández, Steve ...