Sciweavers

354 search results - page 17 / 71
» Key management for content access control in a hierarchy
Sort
View
IJWBC
2008
120views more  IJWBC 2008»
14 years 9 months ago
Internet governance: towards a non-representational democracy
: Internet governance is a contentious topic referring to the global control and management of key internet resources such as IP addresses. Research suggests that the existence of ...
Martin Hans Knahl, Geoff Cox
ACSAC
2005
IEEE
15 years 3 months ago
Paranoid: A Global Secure File Access Control System
The Paranoid file system is an encrypted, secure, global file system with user managed access control. The system provides efficient peer-to-peer application transparent file ...
Fareed Zaffar, Gershon Kedem, Ashish Gehani
WWW
2001
ACM
15 years 10 months ago
WebGuard: A System for Web Content Protection
In this paper, we present WebGuard, a content protection system for Web documents. WebGuard allows content owners to exercise control over usage conditions governing access to the...
Magda Mourad, Jonathan Munson, Tamer Nadeem, Giova...
SACMAT
2003
ACM
15 years 2 months ago
The role control center: features and case studies
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...
ACSAC
1998
IEEE
15 years 1 months ago
The RRA97 Model for Role-Based Administration of Role Hierarchies
Abstract Role-based access control RBAC has recently received a lot of attention due to its exibility, expressive power and simplicity in administration. In RBAC permissions are as...
Ravi S. Sandhu, Qamar Munawer