Sciweavers

6555 search results - page 3 / 1311
» Secure attribute-based systems
Sort
View
111
Voted
WISTP
2010
Springer
15 years 8 months ago
Attribute-Based Encryption with Break-Glass
Achim D. Brucker, Helmut Petritsch, Stefan G. Webe...
CCS
2010
ACM
15 years 8 months ago
Attribute based data sharing with attribute revocation
Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou
104
Voted
COLCOM
2008
IEEE
15 years 7 months ago
A Constraint and Attribute Based Security Framework for Dynamic Role Assignment in Collaborative Environments
Abstract. We investigate a security framework for collaborative applications that relies on the role-based access control (RBAC) model. In our framework, roles are pre-defined and...
Isabel F. Cruz, Rigel Gjomemo, Benjamin Lin, Mirko...
74
Voted
ISCI
2010
105views more  ISCI 2010»
14 years 11 months ago
Secure threshold multi authority attribute based encryption without a central authority
Huang Lin, Zhenfu Cao, Xiaohui Liang, Jun Shao
126
Voted
ACSAC
2002
IEEE
15 years 6 months ago
A Model for Attribute-Based User-Role Assignment
The Role-Based Access Control (RBAC) model is traditionally used to manually assign users to appropriate roles, based on a specific enterprise policy, thereby authorizing them to ...
Mohammad A. Al-Kahtani, Ravi S. Sandhu