Sciweavers

243 search results - page 28 / 49
» A flexible access control mechanism for CAD frameworks
Sort
View
COMPSAC
2002
IEEE
15 years 4 months ago
Personalized Redirection of Communication
Universal access to information and data is an important goal of current research. Previously different forms of information and data, captured by different devices or held on dif...
Yuping Yang, M. Howard Williams
ER
2010
Springer
124views Database» more  ER 2010»
14 years 9 months ago
Integrity Assurance for RESTful XML
The REpresentational State Transfer (REST) represents an extensible, easy and elegant architecture for accessing web-based resources. REST alone and in combination with XML is fast...
Sebastian Graf, Lukas Lewandowski, Marcel Waldvoge...
SP
2007
IEEE
113views Security Privacy» more  SP 2007»
15 years 6 months ago
Usable Mandatory Integrity Protection for Operating Systems
Existing mandatory access control systems for operating systems are difficult to use. We identify several principles for designing usable access control systems and introduce the...
Ninghui Li, Ziqing Mao, Hong Chen
ECOOPW
1998
Springer
15 years 3 months ago
Role-Based Protection and Delegation for Mobile Object Environments
PrincipalDomain is an administrative scoping construct for establishing security policies based on the principals invoking object services that may entail objects moving around a ...
Nataraj Nagaratnam, Doug Lea
ACSAC
2009
IEEE
15 years 6 months ago
How to Securely Break into RBAC: The BTG-RBAC Model
—Access control models describe frameworks that dictate how subjects (e.g. users) access resources. In the Role-Based Access Control (RBAC) model access to resources is based on ...
Ana Ferreira, David W. Chadwick, Pedro Farinha, Ri...