Sciweavers

163 search results - page 12 / 33
» Specifying and enforcing constraints in role-based access co...
Sort
View
POLICY
2009
Springer
15 years 5 months ago
Towards Session-Aware RBAC Administration and Enforcement with XACML
Abstract—An administrative role-based access control (ARBAC) model specifies administrative policies over a role-based access control (RBAC) system, where an administrative perm...
Min Xu, Duminda Wijesekera, Xinwen Zhang, Deshan C...
69
Voted
SAC
2002
ACM
14 years 10 months ago
An agreement centric access control mechanism for business to business e-commerce
We argue that matrix-based models are inadequate for regulating business to business (or B2B, for short) e-commerce due to the diversity, complexity and potential large number of ...
Victoria Ungureanu
TASE
2007
IEEE
15 years 5 months ago
Constraint-Based Policy Negotiation and Enforcement for Telco Services
Telco services are evolving under several aspects: for instance, services may combine different telecommunication features (messaging, multi-media, etc.) and may be activated and...
Maria Grazia Buscemi, Laura Ferrari, Corrado Moiso...
ENTCS
2007
199views more  ENTCS 2007»
14 years 11 months ago
Heuristics for Safety and Security Constraints
The flow logic approach to static analysis amounts to specifying the admissibility of solutions to analysis problems; when specified using formulae in stratified alternation-fr...
Flemming Nielson, Hanne Riis Nielson
ICICS
2003
Springer
15 years 4 months ago
A Policy Based Framework for Access Control
This paper presents a policy-based framework for managing access control in distributed heterogeneous systems. This framework is based on the PDP/PEP approach. The PDP (Policy Deci...
Ricardo Nabhen, Edgard Jamhour, Carlos Maziero