Sciweavers

351 search results - page 16 / 71
» Formalisation and implementation of Access control models
Sort
View
101
Voted
IRI
2005
IEEE
15 years 6 months ago
Towards administration of a hybrid role hierarchy
Role-Based Access Control (RBAC) models have emerged as a leading access control approach for today’s information systems. Hybrid role hierarchies introduced in the Generalized ...
Suroop Mohan Chandran, James B. D. Joshi
102
Voted
ICSE
2007
IEEE-ACM
16 years 15 days ago
Ownership and Immutability Inference for UML-Based Object Access Control
We propose a mechanism for object access control which is based on the UML. Specifically, we propose use of ownership and immutability constraints on UML associations and verifica...
Yin Liu, Ana Milanova
COMSWARE
2008
IEEE
15 years 2 months ago
Collaborative group membership and access control for JXTA
Abstract-- This paper presents a proposal for group membership and access control services for JXTA, both based on the principle of self-organization and collaboration of peer grou...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...
170
Voted
SIGMOD
2006
ACM
124views Database» more  SIGMOD 2006»
16 years 17 days ago
Redundancy and information leakage in fine-grained access control
The current SQL standard for access control is coarse grained, in that it grants access to all rows of a table or none. Fine-grained access control, which allows control of access...
Govind Kabra, Ravishankar Ramamurthy, S. Sudarshan
96
Voted
JIIS
2002
118views more  JIIS 2002»
15 years 2 days ago
Authorization and Access Control of Application Data in Workflow Systems
: Workflow Management Systems (WfMSs) are used to support the modeling and coordinated execution of business processes within an organization or across organizational boundaries. A...
Shengli Wu, Amit P. Sheth, John A. Miller, Zongwei...