Sciweavers

5252 search results - page 68 / 1051
» Logic in Access Control
Sort
View
192
Voted
ICDE
1996
IEEE
178views Database» more  ICDE 1996»
16 years 1 months ago
Authorization and Access Control in IRO-DB
A. Min Tjoa, Fritz Kastner, Günther Pernul, S...
ICPP
2005
IEEE
15 years 6 months ago
Distributed Access Control in CROWN Groups
Security in collaborative groups is an active research topic and has been recognized by many organizations in the past few years. In this paper, we propose a fine-grained and attr...
Jinpeng Huai, Yu Zhang, Xianxian Li, Yunhao Liu
99
Voted
AINA
2009
IEEE
15 years 5 months ago
Location-Aware Authentication and Access Control
—The paper first discusses motivations why taking into account location information in authentication and access control is important. The paper then surveys current approaches t...
Elisa Bertino, Michael S. Kirkpatrick
WORDS
2002
IEEE
15 years 5 months ago
Role-Based Access Control for CORBA Distributed Object Systems
This paper shows how role-based access control (RBAC) models can be implemented in distributed object-based systems that follow OMG/CORBA standards. We introduce a novel approach ...
Rafael R. Obelheiro, Joni da Silva Fraga
CORR
2006
Springer
113views Education» more  CORR 2006»
15 years 19 days ago
Event Systems and Access Control
Abstract. We consider the interpretations of notions of access control (permissions, interdictions, obligations, and user rights) as run-time properties of information systems spec...
Dominique Méry, Stephan Merz