Sciweavers

116 search results - page 14 / 24
» Role-Based Access Control Requirements Model with Purpose Ex...
Sort
View
IEEEARES
2008
IEEE
15 years 3 months ago
Context Ontology for Secure Interoperability
During interoperability exchanges, organizations are jointly conducting computation and sharing tasks. However, organizations can have different security policies. To guarantee g...
Céline Coma, Nora Cuppens-Boulahia, Fr&eacu...
SACMAT
2003
ACM
15 years 2 months ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck
83
Voted
SACMAT
2009
ACM
15 years 4 months ago
Supporting RBAC with XACML+OWL
XACML does not natively support RBAC and even the specialized XACML profiles are not able to support many relevant constraints such as static and dynamic separation of duty. Exte...
Rodolfo Ferrini, Elisa Bertino
CN
2000
76views more  CN 2000»
14 years 9 months ago
Supporting reconfigurable security policies for mobile programs
Programming models that support code migration have gained prominence, mainly due to a widespread shift from stand-alone to distributed applications. Although appealing in terms o...
Brant Hashii, Scott Malabarba, Raju Pandey, Matt B...
90
Voted
CAISE
2003
Springer
15 years 2 months ago
User Roles in Document Analysis
In a modern business process, documents are important carriers of information between organisations. Document management solutions are increasingly based on structured document for...
Pasi Tiitinen