Sciweavers

5273 search results - page 192 / 1055
» Secured Web Access
Sort
View
WETICE
1997
IEEE
15 years 8 months ago
How Role Based Access Control is Implemented in SESAME
In this paper we want to share our experiences with implementing a scheme that enforces role based access control in a distributed, heterogeneous computing environment. This work ...
Mark Vandenwauver, René Govaerts, Joos Vand...
DBSEC
2001
154views Database» more  DBSEC 2001»
15 years 6 months ago
Regulating Access to XML documents
In this paper, our objective is to define a security model for regulating access to XML documents. Our model offers a security policy with a great expressive power. An XML documen...
Alban Gabillon, Emmanuel Bruno
IJNSEC
2010
145views more  IJNSEC 2010»
14 years 11 months ago
Formal Specification of Common Criteria Based Access Control Policy Model
One of the major threats that an enterprise Information system networks are facing today is the Insider threat. As part of the Insider Threat study, lack of an effective access co...
Manpreet Singh, Manjeet S. Patterh
ICCCN
2007
IEEE
15 years 11 months ago
An overlay approach for enabling access to dynamically shared backbone GMPLS networks
— In this paper, we address the question of how to introduce new Quality-of-Service enhancements into the existing Internet. Specifically, dynamically shared circuitswitched/vir...
Xiuduan Fang, Malathi Veeraraghavan, Mark E. McGin...
93
Voted
TIS
1998
59views more  TIS 1998»
15 years 4 months ago
Information Access in Africa: Problems with Every Channel
: Every information channel within Africa is restricted. Limited budgets cause televison stations to produce few shows of their own and to fill airtime with cheap American imports ...
William Wresch