Sciweavers

5252 search results - page 69 / 1051
» Logic in Access Control
Sort
View
USS
2008
15 years 7 months ago
Access Control for Federation of Emulab-based Network Testbeds
This paper describes a resource access control system for federation of Emulab-based testbeds within the DETER federation architecture. The system is based on three levels of prin...
Ted Faber, John Wroclawski
USENIX
2003
15 years 6 months ago
POSIX Access Control Lists on Linux
This paper discusses file system Access Control Lists as implemented in several UNIX-like operating systems. After recapitulating the concepts of these Access Control Lists that ...
Andreas Grünbacher
MOBISYS
2007
ACM
16 years 4 months ago
Rendezvous-based access control for medical records in the pre-hospital environment
We present rendezvous-based access control for access control in the pre-hospital environment. Rendezvous-based access control is a simple cryptographic access control method that...
Feike W. Dillema, Simone Lupetti
SIGMOD
2006
ACM
124views Database» more  SIGMOD 2006»
16 years 5 months ago
Redundancy and information leakage in fine-grained access control
The current SQL standard for access control is coarse grained, in that it grants access to all rows of a table or none. Fine-grained access control, which allows control of access...
Govind Kabra, Ravishankar Ramamurthy, S. Sudarshan
ESORICS
2008
Springer
15 years 7 months ago
On the Security of Delegation in Access Control Systems
Delegation is a mechanism that allows a user A to act on another user B's behalf by making B's access rights available to A. It is well recognized as an important mechani...
Qihua Wang, Ninghui Li, Hong Chen