Sciweavers

445 search results - page 14 / 89
» Authorization and Access Control in IRO-DB
Sort
View
ACSAC
2001
IEEE
15 years 1 months ago
The Authorization Service of Tivoli Policy Director
This paper presents the Authorization Service provided by Tivoli Policy Director (PD) and its use by PD family members as well as third-party applications. Policies are defined ov...
Günter Karjoth
IFIP
2004
Springer
15 years 3 months ago
Discretionary Overriding of Access Control in the Privilege Calculus
We extend a particular access control framework, the Privilege Calculus, with a possibility to override denied access for increased flexibility in hard to define or unanticipated...
Erik Rissanen, Babak Sadighi Firozabadi, Marek J. ...
83
Voted
ACISP
2008
Springer
15 years 4 months ago
Advanced Permission-Role Relationship in Role-Based Access Control
Abstract. Permission-role assignment is an important issue in rolebased access control (RBAC). There are two types of problems that may arise in permission-role assignment. One is ...
Min Li, Hua Wang, Ashley W. Plank, Jianming Yong
JCM
2007
122views more  JCM 2007»
14 years 9 months ago
Petri Net Based Controller Concept For Cognitive Radios in Wireless Access Networks
—This paper will give a detailed discussion about the authors view on Software Defined and Cognitive Radio.
Alexander Vießmann, Admir Burnic, Christoph ...
JSW
2008
101views more  JSW 2008»
14 years 9 months ago
Implicit Authorization for Social Location Disclosure
Being increasingly equipped with highly-accurate positioning technologies, today's mobile phones enable their owners to transmit their current position over the cellular netwo...
Georg Treu, Florian Fuchs, Christiane Dargatz