Sciweavers

860 search results - page 17 / 172
» On the Security of Delegation in Access Control Systems
Sort
View
116
Voted
ISW
2004
Springer
15 years 7 months ago
Model-Checking Access Control Policies
We present a model of access control which provides fine-grained data-dependent control, can express permissions about permissions, can express delegation, and can describe syste...
Dimitar P. Guelev, Mark Ryan, Pierre-Yves Schobben...
ACSAC
2005
IEEE
15 years 7 months ago
Paranoid: A Global Secure File Access Control System
The Paranoid file system is an encrypted, secure, global file system with user managed access control. The system provides efficient peer-to-peer application transparent file ...
Fareed Zaffar, Gershon Kedem, Ashish Gehani
IEEEIAS
2009
IEEE
15 years 8 months ago
Secure Access Control Scheme of RFID System Application
-- Radio Frequency Identification (RFID) is a contactless technology, it is considered the way to replace the barcode, since the barcode data is read with line of sight and limits ...
Yu-Chih Huang
SACMAT
2004
ACM
15 years 7 months ago
Security analysis in role-based access control
Ninghui Li, Mahesh V. Tripunitara