Sciweavers

708 search results - page 59 / 142
» A Policy Based Framework for Access Control
Sort
View
CAISE
2010
Springer
15 years 4 months ago
Dynamic Authorisation Policies for Event-Based Task Delegation
Task delegation presents one of the business process security leitmotifs. It defines a mechanism that bridges the gap between both workflow and access control systems. There are tw...
Khaled Gaaloul, Ehtesham Zahoor, François C...
NETWORK
2007
159views more  NETWORK 2007»
15 years 3 months ago
A Generic Framework for Modeling MAC Protocols in Wireless Broadband Access Networks
In this article, we present a simple yet accurate generic analytical model for a family of slotted carrier sense multiple access with collision avoidance (CSMA/CA) based medium ac...
Xinhua Ling, Jon W. Mark, Xuemin Shen, Yu Cheng
ASWC
2006
Springer
15 years 6 months ago
A Semantic Search Conceptual Model and Application in Security Access Control
Abstract. We propose a conceptual model for semantic search and implement it in security access control. The model provides security access control to extend the search capabilitie...
Kunmei Wen, Zhengding Lu, Ruixuan Li, Xiaolin Sun,...
SACMAT
2006
ACM
15 years 10 months ago
Constraint generation for separation of duty
Separation of Duty (SoD) is widely recognized to be a fundamental principle in computer security. A Static SoD (SSoD) policy states that in order to have all permissions necessary...
Hong Chen, Ninghui Li
163
Voted
IJCMAM
2010
160views more  IJCMAM 2010»
15 years 1 months ago
Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records
Commercial Web-based Personal-Health Record (PHR) systems can help patients to share their personal health records (PHRs) anytime from anywhere. PHRs are very sensitive data and an...
Luan Ibraimi, Qiang Tang, Pieter H. Hartel, Willem...