Sciweavers

304 search results - page 25 / 61
» Future Directions in Role-Based Access Control Models
Sort
View
CDC
2008
IEEE
15 years 6 months ago
On stability in the presence of analog erasure channels
— Consider a discrete-time networked control scheme, in which the controller has direct access to noisy measurements of the plant’s output, but the controller and the actuator ...
Vijay Gupta, Nuno C. Martins
CCS
2011
ACM
13 years 11 months ago
Automatic error finding in access-control policies
Verifying that access-control systems maintain desired security properties is recognized as an important problem in security. Enterprise access-control systems have grown to prote...
Karthick Jayaraman, Vijay Ganesh, Mahesh V. Tripun...
SACMAT
2009
ACM
15 years 4 months ago
A formal framework to elicit roles with business meaning in RBAC systems
The role-based access control (RBAC) model has proven to be cost effective to reduce the complexity and costs of access permission management. To maximize the advantages offered...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
ESORICS
2004
Springer
15 years 5 months ago
Security Property Based Administrative Controls
Abstract. Access control languages which support administrative controls, and thus allow the ordinary permissions of a system to change, have traditionally been constructed with ï¬...
Jon A. Solworth, Robert H. Sloan
CCS
2006
ACM
15 years 3 months ago
On the modeling and analysis of obligations
Traditional security policies largely focus on access control requirements, which specify who can access what under what circumstances. Besides access control requirements, the av...
Keith Irwin, Ting Yu, William H. Winsborough