Sciweavers

114 search results - page 7 / 23
» Cooperative role-based administration
Sort
View
92
Voted
RBAC
1998
84views more  RBAC 1998»
15 years 1 months ago
Decentralized User-role Assignment for Web-based Intranets
The intricacy of security administration is one of the most challenging problems in large networked systems. This problem is especially serious in the Web environment, which consi...
Ravi S. Sandhu, Joon S. Park
121
Voted
SERP
2010
14 years 10 months ago
Role Explosion: Acknowledging the Problem
- In large enterprises subject to constant employee turnover and challenging security policies, the administration of Role-based Access Control (RBAC) is a daunting task that is of...
Aaron Elliott, Scott Knight
96
Voted
MKWI
2008
169views Business» more  MKWI 2008»
15 years 1 months ago
A Portal for Cross-Administrative Acquisition and Specification of Software Requirements
: For the development of software requirements within a team, efficient communication and a systematic approach are necessary. Because of the complexity of the task, the need for s...
Norman Riegel, Holger Branding, Michael Geisser, T...
85
Voted
IJNSEC
2007
83views more  IJNSEC 2007»
15 years 3 days ago
Secure Logging for Irrefutable Administration
This paper presents a method that allows for securely saving a temporal sequence of data (log lines) in a file. Log lines are signed by an authority, and are thus unalterable wit...
Paolo Dal Checco, Francesco Bergadano, Davide Cava...
122
Voted
ACSAC
2002
IEEE
15 years 5 months ago
Access Control for Active Spaces
Active Spaces are physical spaces augmented with heterogeneous computing and communication devices along with supporting software infrastructure. This integration facilitates coll...
Geetanjali Sampemane, Prasad Naldurg, Roy H. Campb...