Sciweavers

5252 search results - page 75 / 1051
» Logic in Access Control
Sort
View
DSS
2007
124views more  DSS 2007»
15 years 5 months ago
Access control in collaborative commerce
Corporate collaboration allows organizations to improve the efficiency and quality of their business activities. It may occur as a workflow collaboration, a supply chain collabora...
Eldon Y. Li, Timon C. Du, Jacqueline W. Wong
HOTNETS
2010
15 years 7 days ago
CloudPolice: taking access control out of the network
Cloud computing environments impose new challenges on access control techniques due to multi-tenancy, the growing scale and dynamicity of hosts within the cloud infrastructure, an...
Lucian Popa 0002, Minlan Yu, Steven Y. Ko, Sylvia ...
ACSAC
2009
IEEE
15 years 9 months ago
A Network Access Control Mechanism Based on Behavior Profiles
Abstract--Current Network Access Control (NAC) technologies manage the access of new devices into a network to prevent rogue devices from attacking network hosts or services. Typic...
Vanessa Frías-Martínez, Joseph Sherr...
GRID
2007
Springer
15 years 5 months ago
Managing Role-Based Access Control Policies for Grid Databases in OGSA-DAI Using CAS
In this paper, we present a role-based access control method for accessing databases through the Open Grid Services Architecture – Data Access and Integration (OGSA-DAI) framewor...
Anil L. Pereira, Vineela Muppavarapu, Soon M. Chun...
SOUPS
2009
ACM
15 years 12 months ago
How users use access control
Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requ...
Diana K. Smetters, Nathan Good