Sciweavers

3899 search results - page 43 / 780
» Argumentation for Access Control
Sort
View
CSREASAM
2007
15 years 1 months ago
Contextual Risk-Based Access Control
- Context-based access control is an emerging approach for modeling adaptive solution, making access control management more flexible and powerful. However, these strategies are in...
Nguyen Ngoc Diep, Sungyoung Lee, Young-Koo Lee, He...
IKE
2003
15 years 1 months ago
Access Control System Using Web Services for XML Messaging Systems
We describe the design of an Access Control System using Web Services for information and content management. In this paper we described the solution for control mechanism of the ...
Ali Kaplan, Ahmet E. Topcu, Marlon E. Pierce, Geof...
DBSEC
2009
163views Database» more  DBSEC 2009»
15 years 27 days ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...
JCS
2010
124views more  JCS 2010»
14 years 10 months ago
Verifying resource access control on mobile interactive devices
A model of resource access control is presented in which the access control to resources can employ user interaction to obtain the necessary permissions. This model is inspired by...
Frédéric Besson, Guillaume Dufay, Th...
IAT
2010
IEEE
14 years 9 months ago
Risk Analysis in Access Control Systems Based on Trust Theories
There is a need for research on the scientific base and engineering requirements for building trustworthy systems in dynamic environments. To address this need, we study risk analy...
J. Ma, Luigi Logrippo, Kamel Adi, Serge Mankovski