Sciweavers

304 search results - page 22 / 61
» Future Directions in Role-Based Access Control Models
Sort
View
NETWORK
2007
159views more  NETWORK 2007»
14 years 11 months ago
A Generic Framework for Modeling MAC Protocols in Wireless Broadband Access Networks
In this article, we present a simple yet accurate generic analytical model for a family of slotted carrier sense multiple access with collision avoidance (CSMA/CA) based medium ac...
Xinhua Ling, Jon W. Mark, Xuemin Shen, Yu Cheng
SACMAT
2005
ACM
15 years 5 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang
RBAC
1998
84views more  RBAC 1998»
15 years 1 months ago
Decentralized User-role Assignment for Web-based Intranets
The intricacy of security administration is one of the most challenging problems in large networked systems. This problem is especially serious in the Web environment, which consi...
Ravi S. Sandhu, Joon S. Park
BPM
2006
Springer
149views Business» more  BPM 2006»
15 years 1 months ago
Verifying BPEL Workflows Under Authorisation Constraints
Abstract. Business Process Execution Language (BPEL), or Web Services BPEL (WS-BPEL), is the standard for specifying workflow process definition using web services. Research on for...
Zhao Xiangpeng, Antonio Cerone, Padmanabhan Krishn...
83
Voted
ICSE
2007
IEEE-ACM
15 years 12 months ago
When Role Models Have Flaws: Static Validation of Enterprise Security Policies
Modern multiuser software systems have adopted RoleBased Access Control (RBAC) for authorization management. This paper presents a formal model for RBAC policy validation and a st...
Marco Pistoia, Stephen J. Fink, Robert J. Flynn, E...