Sciweavers

2655 search results - page 96 / 531
» Event Systems and Access Control
Sort
View
RTCSA
2007
IEEE
15 years 11 months ago
Activity-based Access Control Model to Hospital Information
Hospital work is characterized by the need to manage multiple activities simultaneously, constant local mobility, frequently interruptions, and intense collaboration and communica...
Le Xuan Hung, Sungyoung Lee, Young-Koo Lee, Heejo ...
DBSEC
2009
130views Database» more  DBSEC 2009»
15 years 5 months ago
Implementing Reflective Access Control in SQL
Reflective Database Access Control (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege in an access control ...
Lars E. Olson, Carl A. Gunter, William R. Cook, Ma...
CODASPY
2012
14 years 10 days ago
Comparison-based encryption for fine-grained access control in clouds
Access control is one of the most important security mechanisms in cloud computing. However, there has been little work that explores various comparison-based constraints for regu...
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Mengyang Yu, H...
ESORICS
2009
Springer
15 years 11 months ago
Access Control in Location-Based Services
Recent enhancements in location technologies reliability and precision are fostering the development of a new wave of applications that make use of the location information of user...
Claudio Agostino Ardagna, Marco Cremonini, Sabrina...
133
Voted
ECTEL
2007
Springer
15 years 10 months ago
Role Based Access Control for the Interaction with Search Engines
Search engine-based features are a basic interaction mean for users to find information inside a Web-based Learning Management Systems (LMS); nonetheless, traditional solutions la...
Alessandro Bozzon, Tereza Iofciu, Wolfgang Nejdl, ...