Sciweavers

371 search results - page 6 / 75
» On the Modeling of Bell-LaPadula Security Policies Using RBA...
Sort
View
SACMAT
2003
ACM
15 years 2 months ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck
IRI
2007
IEEE
15 years 3 months ago
ARBAC07: A Role-based Administration Model for RBAC with Hybrid Hierarchy
Recently, administration of RBAC systems using rolebased approach has become very appealing because of the benefits that a role-based approach typically brings. This approach uses...
Yue Zhang 0002, James B. D. Joshi
WORDS
2005
IEEE
15 years 3 months ago
A Role-Based Access Control Policy Verification Framework for Real-Time Systems
This paper presents a framework for verifying the access control requirements of real-time application systems such as workflow management systems and active databases. The tempor...
Basit Shafiq, Ammar Masood, James Joshi, Arif Ghaf...
IADIS
2003
14 years 11 months ago
Integrating RBAC Mechanisms in a Web Server
Hypermedia systems (whether web sites or not) should support multilevel policiesm, offering different views and manipulation abilities of the same information to users with differ...
Daniel Sanz-García, Paloma Díaz, Ign...
ACSAC
2003
IEEE
15 years 2 months ago
A Policy Validation Framework for Enterprise Authorization Specification
The validation of enterprise authorization specification for conformance to enterprise security policies requires an out-of-band framework in many situations since the enforcing a...
Ramaswamy Chandramouli