Sciweavers

195 search results - page 12 / 39
» How Role Based Access Control is Implemented in SESAME
Sort
View
ACSAC
2000
IEEE
15 years 1 months ago
Implementing Security Policies using the Safe Areas of Computation Approach
The World Wide Web is playing a major role in reducing business costs and in providing convenience to users. Digital Libraries capitalize on this technology to distribute document...
André L. M. dos Santos, Richard A. Kemmerer
ICC
2007
IEEE
15 years 3 months ago
Framework for Agent-Based Role Delegation
— This paper describes a framework for addressing the administration of role delegation introduced in the wellknown role-based access control model (RBAC). More specifically, thi...
Ezedin Barka, Ravi S. Sandhu
ESCIENCE
2006
IEEE
14 years 11 months ago
Domain Based Access Control Model for Distributed Collaborative Applications
This paper describes the design and development of a flexible domain-based access control infrastructure for distributed Collaborative Environments. The paper proposes extensions ...
Yuri Demchenko, Cees de Laat, Leon Gommans, Ren&ea...
COORDINATION
2005
Springer
15 years 2 months ago
Coordination Systems in Role-Based Adaptive Software
Software systems are becoming more open, distributed, pervasive, and connected. In such systems, the relationships between loosely-coupled application elements become non-determini...
Alan W. Colman, Jun Han
74
Voted
ASWC
2006
Springer
14 years 11 months ago
A Semantic Search Conceptual Model and Application in Security Access Control
Abstract. We propose a conceptual model for semantic search and implement it in security access control. The model provides security access control to extend the search capabilitie...
Kunmei Wen, Zhengding Lu, Ruixuan Li, Xiaolin Sun,...