Sciweavers

5252 search results - page 54 / 1051
» Logic in Access Control
Sort
View
76
Voted
SACMAT
2004
ACM
15 years 6 months ago
Security analysis in role-based access control
Ninghui Li, Mahesh V. Tripunitara
64
Voted
SACMAT
2003
ACM
15 years 5 months ago
An administration concept for the enterprise role-based access control model
Axel Kern, Andreas Schaad, Jonathan D. Moffett
DEXAW
2003
IEEE
99views Database» more  DEXAW 2003»
15 years 5 months ago
A Model for Context-dependent Access Control for Web-based Services with Role-based Approach
Controlling access to resources is one of the most important protection goals for web-based services in practice. In general, access control requires identification of subjects t...
Ruben Wolf, Thomas Keinz, Markus Schneider
93
Voted
HICSS
2003
IEEE
107views Biometrics» more  HICSS 2003»
15 years 5 months ago
XML Access Control for Semantically Related XML Documents
The extensible markup language (XML) is a standard for describing information on the Internet and is quickly becoming the most preferred way to store and exchange information. The...
Vijay Parmar, Hongchi Shi, Su-Shing Chen
100
Voted
ACSAC
1999
IEEE
15 years 4 months ago
An Asynchronous Distributed Access Control Architecture for IP over ATM Networks
In this article, we describe a new architecture providing the access control service in both ATM and IPover-ATM networks. This architecture is based on agents distributed in netwo...
Olivier Paul, Maryline Laurent, Sylvain Gombault