Sciweavers

804 search results - page 15 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
GRID
2006
Springer
14 years 9 months ago
Cacheable Decentralized Groups for Grid Resource Access Control
Abstract-- Sharing data among collaborators in widely distributed systems remains a challenge due to limitations with existing methods for defining groups across administrative dom...
Jeffrey Hemmes, Douglas Thain
93
Voted
ACSAC
2000
IEEE
15 years 1 months ago
A Flexible Access Control Service for Java Mobile Code
Mobile Code (MC) technologies provide appealing solutionsfor the development of Internet applications.For instance, Java technologyfacilitates dynamic loading of application code ...
Antonio Corradi, Rebecca Montanari, Cesare Stefane...
PKDD
2004
Springer
205views Data Mining» more  PKDD 2004»
15 years 2 months ago
Breaking Through the Syntax Barrier: Searching with Entities and Relations
The next wave in search technology will be driven by the identification, extraction, and exploitation of real-world entities represented in unstructured textual sources. Search sy...
Soumen Chakrabarti
OTM
2007
Springer
15 years 3 months ago
A Role and Attribute Based Access Control System Using Semantic Web Technologies
We show how Semantic Web technologies can be used to build an access control system. We follow the role-based access control approach (RBAC) and extend it with contextual attribute...
Lorenzo Cirio, Isabel F. Cruz, Roberto Tamassia
ENTCS
2007
121views more  ENTCS 2007»
14 years 9 months ago
Audit-Based Access Control for Electronic Health Records
Traditional access control mechanisms aim to prevent illegal actions a-priori occurrence, i.e. before granting a request for a document. There are scenarios however where the secu...
M. A. C. Dekker, Sandro Etalle