Sciweavers

195 search results - page 13 / 39
» How Role Based Access Control is Implemented in SESAME
Sort
View
SPC
2005
Springer
15 years 3 months ago
TrustAC: Trust-Based Access Control for Pervasive Devices
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...
Florina Almenárez Mendoza, Andrés Ma...
80
Voted
TRUSTBUS
2004
Springer
15 years 2 months ago
Dynamically Changing Trust Structure in Capability Based Access Control Systems
The functioning of modern IT-systems with autonomously acting components requires an elaborate access control system in which each participant can maintain her own trust structure....
Sandra Wortmann, Barbara Sprick, Christoph Kobusch
ADC
2005
Springer
111views Database» more  ADC 2005»
15 years 3 months ago
An Access Control Method Based on the Prefix Labeling Scheme for XML Repositories
This paper describes an access control method of the XML repository system, SAXOPHONE, which was implemented at Tokyo Metropolitan University. The main feature of our research is ...
Shohei Yokoyama, Manabu Ohta, Kaoru Katayama, Hiro...
83
Voted
ICDCIT
2004
Springer
15 years 2 months ago
Automatic Enforcement of Access Control Policies Among Dynamic Coalitions
The need to securely share information on an ad-hoc basis between collaborating entities is increasingly becoming important. We propose a coalition based access control model (CBAC...
Vijayalakshmi Atluri, Janice Warner
RBAC
2000
129views more  RBAC 2000»
14 years 11 months ago
Enabling technologies for role based online decision engines
: Enabling Technologies for Role Based Online Decision Engines Thomas Hildmann, Thomas Gebhardt 22-Feb-2000 The goal of our work at the Technical University of Berlin is to develop...
Thomas Gebhardt, Thomas Hildmann