Sciweavers

311 search results - page 44 / 63
» Administration in role-based access control
Sort
View
SOSP
2003
ACM
15 years 6 months ago
Decentralized user authentication in a global file system
The challenge for user authentication in a global file system is allowing people to grant access to specific users and groups in remote administrative domains, without assuming ...
Michael Kaminsky, George Savvides, David Mazi&egra...
DBSEC
2003
155views Database» more  DBSEC 2003»
14 years 11 months ago
Schema Based XML Security: RBAC Approach
As a platform-independent solution, XML is going to be used in many environments such as application integration and Web Services. Security of XML instance is a basic problem, esp...
Xinwen Zhang, Jaehong Park, Ravi S. Sandhu
EUROMICRO
2004
IEEE
15 years 1 months ago
Handover in Mobile Communication Networks: Who is in Control Anyway?
The migration from 3rd generation mobile communication networks to 4th generation, purely IP-based networks leads to new chances, but also great risks for the traditional mobile n...
Frank A. Zdarsky, Jens B. Schmitt
POLICY
2007
Springer
15 years 3 months ago
Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall
We present a discretionary access control framework that can be used to control a principal’s ability to link information from two or more audit records and compromise a user’...
Apu Kapadia, Prasad Naldurg, Roy H. Campbell
ICDIM
2007
IEEE
15 years 4 months ago
Context-aware security service in RFID/USN environments using MAUT and extended GRBAC
: This paper proposes a context-aware security service providing multiple authentications and authorization from a Security Level which is decided dynamically in a context-aware en...
Kiyeal Lee, Seokhwan Yang, Sungik Jun, Mokdong Chu...