Sciweavers

3899 search results - page 38 / 780
» Argumentation for Access Control
Sort
View
CSCW
2002
ACM
14 years 11 months ago
A new dimension in access control: studying maintenance engineering across organizational boundaries
Inter-organizational cooperation has specific requirements for access control. The paper presents the results from a field study which looks at the cooperation between two enginee...
Gunnar Stevens, Volker Wulf
CSREASAM
2010
14 years 9 months ago
A Hacking View of Access Control
The importance of computer security in order to maintain the confidentiality, integrity and availability of data and information is well known. Different mechanisms have been propo...
Pedro Diaz-Gomez, Gregory Steen
ICDE
1996
IEEE
178views Database» more  ICDE 1996»
16 years 1 months ago
Authorization and Access Control in IRO-DB
A. Min Tjoa, Fritz Kastner, Günther Pernul, S...
ICPP
2005
IEEE
15 years 5 months ago
Distributed Access Control in CROWN Groups
Security in collaborative groups is an active research topic and has been recognized by many organizations in the past few years. In this paper, we propose a fine-grained and attr...
Jinpeng Huai, Yu Zhang, Xianxian Li, Yunhao Liu
AINA
2009
IEEE
15 years 5 months ago
Location-Aware Authentication and Access Control
—The paper first discusses motivations why taking into account location information in authentication and access control is important. The paper then surveys current approaches t...
Elisa Bertino, Michael S. Kirkpatrick