Sciweavers

3899 search results - page 39 / 780
» Argumentation for Access Control
Sort
View
WORDS
2002
IEEE
15 years 9 months ago
Role-Based Access Control for CORBA Distributed Object Systems
This paper shows how role-based access control (RBAC) models can be implemented in distributed object-based systems that follow OMG/CORBA standards. We introduce a novel approach ...
Rafael R. Obelheiro, Joni da Silva Fraga
CORR
2006
Springer
113views Education» more  CORR 2006»
15 years 4 months ago
Event Systems and Access Control
Abstract. We consider the interpretations of notions of access control (permissions, interdictions, obligations, and user rights) as run-time properties of information systems spec...
Dominique Méry, Stephan Merz
USS
2008
15 years 6 months ago
Access Control for Federation of Emulab-based Network Testbeds
This paper describes a resource access control system for federation of Emulab-based testbeds within the DETER federation architecture. The system is based on three levels of prin...
Ted Faber, John Wroclawski
124
Voted
USENIX
2003
15 years 5 months ago
POSIX Access Control Lists on Linux
This paper discusses file system Access Control Lists as implemented in several UNIX-like operating systems. After recapitulating the concepts of these Access Control Lists that ...
Andreas Grünbacher
MOBISYS
2007
ACM
16 years 3 months ago
Rendezvous-based access control for medical records in the pre-hospital environment
We present rendezvous-based access control for access control in the pre-hospital environment. Rendezvous-based access control is a simple cryptographic access control method that...
Feike W. Dillema, Simone Lupetti