Sciweavers

1357 search results - page 6 / 272
» Controlling Access to Documents: A Formal Access Control Mod...
Sort
View
76
Voted
IFIP
2004
Springer
15 years 2 months ago
A Formal Approach to Specify and Deploy a Network Security Policy
Current firewall configuration languages have no well founded semantics. Each firewall implements its own algorithm that parses specific proprietary languages. The main conseq...
Frédéric Cuppens, Nora Cuppens-Boula...
ER
1999
Springer
152views Database» more  ER 1999»
15 years 1 months ago
Semantically Accessing Documents Using Conceptual Model Descriptions
. When publishing documents on the web, the user needs to describe and classify her documents for the benefit of later retrieval and use. This paper presents an approach to semanti...
Terje Brasethvik, Jon Atle Gulla
81
Voted
SACMAT
2004
ACM
15 years 2 months ago
A role-based approach to access control for XML databases
In order to provide a general access control methodology for parts of XML documents, we propose combining rolebased access control as found in the Role Graph Model, with a methodo...
Jingzhu Wang, Sylvia L. Osborn
97
Voted
FOSAD
2000
Springer
15 years 1 months ago
Access Control: Policies, Models, and Mechanisms
Access control is the process of mediating every request to resources and data maintained by a system and determining whether the request should be granted or denied. The access co...
Pierangela Samarati, Sabrina De Capitani di Vimerc...
88
Voted
DBSEC
2007
138views Database» more  DBSEC 2007»
14 years 11 months ago
A Spatio-temporal Role-Based Access Control Model
With the growing advancement of pervasive computing technologies, we are moving towards an era where spatio-temporal information will be necessary for access control. The use of su...
Indrakshi Ray, Manachai Toahchoodee