Sciweavers

308 search results - page 4 / 62
» Resonance: dynamic access control for enterprise networks
Sort
View
IJNSEC
2010
145views more  IJNSEC 2010»
13 years 1 months ago
Formal Specification of Common Criteria Based Access Control Policy Model
One of the major threats that an enterprise Information system networks are facing today is the Insider threat. As part of the Insider Threat study, lack of an effective access co...
Manpreet Singh, Manjeet S. Patterh
ACSAC
2002
IEEE
13 years 11 months ago
A Model for Attribute-Based User-Role Assignment
The Role-Based Access Control (RBAC) model is traditionally used to manually assign users to appropriate roles, based on a specific enterprise policy, thereby authorizing them to ...
Mohammad A. Al-Kahtani, Ravi S. Sandhu
JIPS
2010
152views more  JIPS 2010»
13 years 1 months ago
Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks
Wireless sensor networks consist of sensor nodes which are expected to be battery-powered and are hard to replace or recharge. Thus, reducing the energy consumption of sensor nodes...
Dae-Suk Yoo, Seung Sik Choi
INAP
2001
Springer
13 years 10 months ago
Content-based Management of Document Access Control
Three different security models have been advocated to determine the access rights to documents in a network of computers; DAC, MLS, and RBAC. Each of these models has its strengt...
Edgar Weippl, Ismail Khalil Ibrahim, Werner Winiwa...