Sciweavers

1641 search results - page 41 / 329
» Subject Composition by Roles
Sort
View
SACMAT
2003
ACM
15 years 7 months ago
The role control center: features and case studies
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...
SELMAS
2004
Springer
15 years 7 months ago
Integrating Free-Flow Architectures with Role Models Based on Statecharts
Abstract. Engineering non-trivial open multi-agent systems is a challenging task. Our research focusses on situated multi-agent systems, i.e. systems in which agents are explicitly...
Danny Weyns, Elke Steegmans, Tom Holvoet
WWW
2008
ACM
16 years 2 months ago
Validating the use and role of visual elements of web pages in navigation with an eye-tracking study
This paper presents an eye-tracking study that examines how people use the visual elements of Web pages to complete certain tasks. Whilst these elements are available to play thei...
Yeliz Yesilada, Caroline Jay, Robert Stevens, Simo...
ISSTA
2006
ACM
15 years 8 months ago
Role-Based access control consistency validation
Modern enterprise systems support Role-Based Access Control (RBAC). Although RBAC allows restricting access to privileged operations, a deployer may actually intend to restrict ac...
Paolina Centonze, Gleb Naumovich, Stephen J. Fink,...
SACMAT
2006
ACM
15 years 8 months ago
Fine-grained role-based delegation in presence of the hybrid role hierarchy
Delegation of authority is an important process that needs to be captured by any access control model. In role-based access control models, delegation of authority involves delega...
James B. D. Joshi, Elisa Bertino