Sciweavers

76 search results - page 3 / 16
» A tool for role-based chatting
Sort
View
ACSAC
2009
IEEE
13 years 4 months ago
RoleVAT: Visual Assessment of Practical Need for Role Based Access Control
Abstract--Role based access control (RBAC) is a powerful security administration concept that can simplify permission assignment management. Migration to and maintenance of RBAC re...
Dana Zhang, Kotagiri Ramamohanarao, Steven Verstee...
UML
2005
Springer
13 years 11 months ago
A Formal Enforcement Framework for Role-Based Access Control Using Aspect-Oriented Programming
Many of today’s software applications require a high-level of security, defined by a detailed policy and attained via mechanisms such as role-based access control (RBAC), mandat...
Jaime A. Pavlich-Mariscal, Laurent Michel, Steven ...
TKDE
2008
177views more  TKDE 2008»
13 years 6 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...
KES
2005
Springer
13 years 11 months ago
Modeling the Discovery of Critical Utterances
The ubiquity of chance discovery can be seen in many areas of application, fundamentally when there are events that are difficult to find or predict. In this paper, we present our...
Calkin A. S. Montero, Yukio Ohsawa, Kenji Araki
ICFEM
2009
Springer
14 years 25 days ago
Role-Based Symmetry Reduction of Fault-Tolerant Distributed Protocols with Language Support
Fault-tolerant (FT) distributed protocols (such as group membership, consensus, etc.) represent fundamental building blocks for many practical systems, e.g., the Google File System...
Péter Bokor, Marco Serafini, Neeraj Suri, H...