Sciweavers

195 search results - page 20 / 39
» How Role Based Access Control is Implemented in SESAME
Sort
View
SACMAT
2003
ACM
15 years 5 months ago
An access control model for dynamic client-side content
The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resource...
Adam Hess, Kent E. Seamons
JODS
2007
138views Data Mining» more  JODS 2007»
14 years 11 months ago
A Formal Framework for Adaptive Access Control Models
Abstract. For several reasons enterprises are frequently subject to organizational change. Respective adaptations may concern business processes, but also other components of an en...
Stefanie Rinderle, Manfred Reichert
WSC
2007
15 years 2 months ago
Building composable bridges between the conceptual space and the implementation space
Often the process and effort in building interoperable Command and Control (C2) systems and simulations can be arduous. Invariably the difficulty is in understanding what is inten...
Paul Gustavson, Tram Chase
CONCURRENCY
2008
104views more  CONCURRENCY 2008»
14 years 12 months ago
PERMIS: a modular authorization infrastructure
Authorization infrastructures manage privileges and render access control decisions, allowing applications to adjust their behavior according to the privileges allocated to users....
David W. Chadwick, Gansen Zhao, Sassa Otenko, Roma...
PROMISE
2010
14 years 6 months ago
The role of the measure of functional complexity in effort estimation
Background. Currently there are several definitions of measures that should represent the size of software functional requirements. These measures have gained a quite relevant rol...
Luigi Lavazza, Gabriela Robiolo