Sciweavers

837 search results - page 20 / 168
» Rewriting-Based Access Control Policies
Sort
View
GRID
2007
Springer
14 years 9 months ago
Managing Role-Based Access Control Policies for Grid Databases in OGSA-DAI Using CAS
In this paper, we present a role-based access control method for accessing databases through the Open Grid Services Architecture – Data Access and Integration (OGSA-DAI) framewor...
Anil L. Pereira, Vineela Muppavarapu, Soon M. Chun...
79
Voted
ESORICS
2009
Springer
15 years 4 months ago
Visualizing Privacy Implications of Access Control Policies in Social Network Systems
Wehypothesizethat, inaFacebook-stylesocial networksystem, proper visualization of one’s extended neighbourhood could help the user understand the privacy implications of her acce...
Mohd M. Anwar, Philip W. L. Fong, Xue-Dong Yang, H...
93
Voted
TRUSTBUS
2009
Springer
15 years 4 months ago
The OPL Access Control Policy Language
Abstract. Existing policy languages suffer from a limited ability of directly and elegantly expressing high-level access control principles such as history-based separation of dut...
Christopher Alm, Ruben Wolf, Joachim Posegga
IEEEIAS
2007
IEEE
15 years 3 months ago
A Purpose-Based Access Control Model
: Achieving privacy preservation in a data-sharing computing environment is becoming a challenging problem. Some organisations may have published privacy policies, which promise pr...
Naikuo Yang, Howard Barringer, Ning Zhang
CCS
2009
ACM
15 years 10 months ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong