Sciweavers

195 search results - page 17 / 39
» How Role Based Access Control is Implemented in SESAME
Sort
View
63
Voted
CSCW
2002
ACM
14 years 9 months ago
A new dimension in access control: studying maintenance engineering across organizational boundaries
Inter-organizational cooperation has specific requirements for access control. The paper presents the results from a field study which looks at the cooperation between two enginee...
Gunnar Stevens, Volker Wulf
106
Voted
CSFW
2012
IEEE
12 years 12 months ago
Gran: Model Checking Grsecurity RBAC Policies
—Role-based Access Control (RBAC) is one of the most widespread security mechanisms in use today. Given the growing complexity of policy languages and access control systems, ver...
Michele Bugliesi, Stefano Calzavara, Riccardo Foca...
EUROPKI
2005
Springer
15 years 3 months ago
Development of a Flexible PERMIS Authorisation Module for Shibboleth and Apache Server
This paper describes the development of a flexible Role Based Access Control (RBAC) authorisation module – the Shibboleth and Apache Authorisation Module (SAAM) which is based on...
Wensheng Xu, David W. Chadwick, Sassa Otenko
DEBS
2008
ACM
14 years 11 months ago
Access control in publish/subscribe systems
Two convincing paradigms have emerged for achieving scalability in widely distributed systems: publish/subscribe communication and role-based, policy-driven control of access to t...
Jean Bacon, David M. Eyers, Jatinder Singh, Peter ...
CCS
2010
ACM
15 years 4 months ago
Cryptographic role-based security mechanisms based on role-key hierarchy
Even though role-based access control (RBAC) can tremendously help us minimize the complexity in administering users, it is still needed to realize the notion of roles at the reso...
Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang