Sciweavers

1818 search results - page 9 / 364
» How users use access control
Sort
View
81
Voted
CCS
2008
ACM
14 years 11 months ago
A formal framework for reflective database access control policies
Reflective Database Access Control (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an acce...
Lars E. Olson, Carl A. Gunter, P. Madhusudan
APNOMS
2007
Springer
15 years 3 months ago
Integrated OTP-Based User Authentication and Access Control Scheme in Home Networks
In this paper, we propose a new user authentication (UA) scheme based on one-time password (OTP) protocol for home networks. The proposed scheme is to authenticate home users ident...
Jongpil Jeong, Min Young Chung, Hyunseung Choo
ACSAC
2002
IEEE
15 years 2 months ago
A Model for Attribute-Based User-Role Assignment
The Role-Based Access Control (RBAC) model is traditionally used to manually assign users to appropriate roles, based on a specific enterprise policy, thereby authorizing them to ...
Mohammad A. Al-Kahtani, Ravi S. Sandhu
ACSAC
2002
IEEE
15 years 2 months ago
Advanced Features for Enterprise-Wide Role-Based Access Control
The administration of users and access rights in large enterprises is a complex and challenging task. Roles are a powerful concept for simplifying access control, but their implem...
Axel Kern
78
Voted
SACMAT
2005
ACM
15 years 3 months ago
Purpose based access control of complex data for privacy protection
As privacy becomes a major concern for both consumers and enterprises, many research efforts have been devoted to the development of privacy protecting technology. We recently pr...
Ji-Won Byun, Elisa Bertino, Ninghui Li