Sciweavers

860 search results - page 73 / 172
» On the Security of Delegation in Access Control Systems
Sort
View
94
Voted
CAISE
2003
Springer
15 years 7 months ago
An Administration Console for the CSAP System
Our group is involved in the European funded Webocracy project in which an e-government system called Webocrat has been designed and implemented. Our responsibility is to provide m...
Fredj Dridi, Björn Muschall, Günther Per...
126
Voted
SACMAT
2003
ACM
15 years 7 months ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
CCS
2008
ACM
15 years 3 months ago
Assessing query privileges via safe and efficient permission composition
We propose an approach for the selective enforcement of access control restrictions in, possibly distributed, large data collections based on two basic concepts: i) flexible autho...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
119
Voted
BTW
2003
Springer
94views Database» more  BTW 2003»
15 years 7 months ago
The Paradigm of Relational Indexing: a Survey
Abstract: In order to achieve efficient execution plans for queries comprising userdefined data types and predicates, the database system has to be provided with appropriate index ...
Hans-Peter Kriegel, Martin Pfeifle, Marco Pöt...
96
Voted
MMMACNS
2001
Springer
15 years 6 months ago
The Set and Function Approach to Modeling Authorization in Distributed Systems
Abstract. We present a new model that provides clear and precise semantics for authorization. The semantics is independent from underling security mechanisms and is separate from i...
Tatyana Ryutov, B. Clifford Neuman