Sciweavers

1627 search results - page 4 / 326
» On context in authorization policy
Sort
View
CLEIEJ
2002
89views more  CLEIEJ 2002»
14 years 9 months ago
JaCoWeb Security - A CORBA Security Discretionary Prototype
This paper presents a CORBA Security discretionary prototype developed in the context of JaCoWeb Security Project. JaCoWeb Security Project is developing an authorization scheme f...
Carla Merkle Westphall, Joni da Silva Fraga, Miche...
68
Voted
DKE
2000
102views more  DKE 2000»
14 years 9 months ago
A Generic Framework for the Modeling of Contexts and its Applications
: Large information bases that are used by several different users and applications accommodate the demands of their users more effectively, if they can be split into possibly over...
Renate Motschnig-Pitrik
88
Voted
COLCOM
2009
IEEE
15 years 2 months ago
The PEI framework for application-centric security
This paper motivates the fundamental importance of application context for security. It then gives an overview of the PEI framework for application-centric security and outlines s...
Ravi S. Sandhu
60
Voted
WISA
2004
Springer
15 years 2 months ago
Inconsistency Detection of Authorization Policies in Distributed Component Environment
In distributed component environment, a Role-Based Access Control (RBAC) server manages all authorization policies of components in the same domains whereas the components are dist...
Chang-Joo Moon, Hoh Peter In
IEEECIT
2005
IEEE
15 years 3 months ago
Context-sensitive Access Control Model and Implementation
Context is a key factor in making make access control decision in modern information system. But a formal context model is needed to guide research of implementation of Context-se...
Weili Han, Junjing Zhang, Xiaobo Yao