Sciweavers

860 search results - page 57 / 172
» On the Security of Delegation in Access Control Systems
Sort
View
SACMAT
2009
ACM
15 years 8 months ago
Trojan horse resistant discretionary access control
Modern operating systems primarily use Discretionary Access Control (DAC) to protect files and other operating system resources. DAC mechanisms are more user-friendly than Mandat...
Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang
INFOCOM
1999
IEEE
15 years 6 months ago
User-Friendly Access Control for Public Network Ports
We are facing a growing user demand for ubiquitous Internet access. As a result, network ports and wireless LANs are becoming common in public spaces inside buildings such as loung...
Guido Appenzeller, Mema Roussopoulos, Mary Baker
SACMAT
2011
ACM
14 years 4 months ago
An approach to modular and testable security models of real-world health-care applications
t http://www.brucker.ch/bibliography/abstract/ brucker.ea-model-based-2011 by permission of ACM for your personal use. Not for redistribution. The definitive version was published...
Achim D. Brucker, Lukas Brügger, Paul Kearney...
AINA
2009
IEEE
15 years 7 months ago
Location-Aware Authentication and Access Control
—The paper first discusses motivations why taking into account location information in authentication and access control is important. The paper then surveys current approaches t...
Elisa Bertino, Michael S. Kirkpatrick
CSREASAM
2006
15 years 3 months ago
Role Based Access Control and the JXTA Peer-to-Peer Framework
Role based access control (RBAC) allows users access to resources based on their competencies and responsibilities within an organization. Typically, RBAC is provided as a securit...
Amit Mathur, Suneuy Kim, Mark Stamp