Sciweavers

445 search results - page 37 / 89
» Authorization and Access Control in IRO-DB
Sort
View
COOPIS
2002
IEEE
15 years 4 months ago
Object Security Attributes: Enabling Application-Specific Access Control in Middleware
This paper makes two main contributions towards establishing support for application-specific factors in middleware security mechanisms. First, it develops a simple classification...
Konstantin Beznosov
NGC
2001
Springer
116views Communications» more  NGC 2001»
15 years 4 months ago
Scalable IP Multicast Sender Access Control for Bi-directional Trees
Bi-directional shared tree is an efficient routing scheme for interactive multicast applications with multiple sources. Given the open-group IP multicast service model, it is impor...
Ning Wang, George Pavlou
SACMAT
2003
ACM
15 years 5 months ago
PBDM: a flexible delegation model in RBAC
Role-based access control (RBAC) is recognized as an efficient access control model for large organizations. Most organizations have some business rules related to access control...
Xinwen Zhang, Sejong Oh, Ravi S. Sandhu
CHI
2008
ACM
16 years 8 days ago
Increasing the accessibility of pen-based technology: an investigation of age-related target acquisition difficulties
This paper describes the author's dissertation research on improving the accessibility of penbased technology. The first step for this research was to gather information on t...
Karyn Moffatt
CCS
2005
ACM
15 years 5 months ago
Automatic placement of authorization hooks in the linux security modules framework
We present a technique for automatic placement of authorization hooks, and apply it to the Linux security modules (LSM) framework. LSM is a generic framework which allows diverse ...
Vinod Ganapathy, Trent Jaeger, Somesh Jha