Sciweavers

213 search results - page 21 / 43
» Managing access and flow control requirements in distributed...
Sort
View
98
Voted
SACMAT
2009
ACM
15 years 7 months ago
Working set-based access control for network file systems
Securing access to files is an important and growing concern in corporate environments. Employees are increasingly accessing files from untrusted devices, including personal hom...
Stephen Smaldone, Vinod Ganapathy, Liviu Iftode
104
Voted
CCS
2007
ACM
15 years 6 months ago
A simple and expressive semantic framework for policy composition in access control
In defining large, complex access control policies, one would like to compose sub-policies, perhaps authored by different organizations, into a single global policy. Existing po...
Glenn Bruns, Daniel S. Dantas, Michael Huth
93
Voted
ECIS
2000
15 years 1 months ago
Towards a Secure Web-Based Health Care Application
Even though security requirements in health care are traditionally high, most computerized health care applications lack sophisticated security measures or focus only on single sec...
Susanne Röhrig, Konstantin Knorr
114
Voted
SACMAT
2003
ACM
15 years 5 months ago
The role control center: features and case studies
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...
102
Voted
IICS
2003
Springer
15 years 5 months ago
Mobile Business Processes
Today’s global markets demand global processes. Increasingly, these processes are not only distributed, but also contain mobile aspects. We discuss two challenges brought about b...
Volker Gruhn, Matthias Book