Sciweavers

137 search results - page 4 / 28
» Extending access control models with break-glass
Sort
View
CCS
2008
ACM
14 years 11 months ago
On spatio-temporal constraints and inheritance in role-based access control
Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based acces...
Liang Chen, Jason Crampton
JSAC
2008
139views more  JSAC 2008»
14 years 9 months ago
A Game-Theoretic Framework for Medium Access Control
In this paper, we generalize the random access game model, and show that it provides a general game-theoretic framework for designing contention based medium access control. We ext...
Tao Cui, Lijun Chen, Steven H. Low
TISSEC
2010
121views more  TISSEC 2010»
14 years 8 months ago
Privacy-aware role-based access control
Privacy has been acknowledged to be a critical requirement for many business (and non-business) environments. Therefore, the definition of an expressive and easy-to-use privacyre...
Qun Ni, Elisa Bertino, Jorge Lobo, Carolyn Brodie,...
IAT
2010
IEEE
14 years 7 months ago
Risk Analysis in Access Control Systems Based on Trust Theories
There is a need for research on the scientific base and engineering requirements for building trustworthy systems in dynamic environments. To address this need, we study risk analy...
J. Ma, Luigi Logrippo, Kamel Adi, Serge Mankovski
IEEECIT
2005
IEEE
15 years 3 months ago
Context-sensitive Access Control Model and Implementation
Context is a key factor in making make access control decision in modern information system. But a formal context model is needed to guide research of implementation of Context-se...
Weili Han, Junjing Zhang, Xiaobo Yao