Sciweavers

329 search results - page 10 / 66
» A Policy Based Role Object Model
Sort
View
SNPD
2008
13 years 10 months ago
The Implementation and Execution Framework of a Role Model Based Language, EpsilonJ
In the social reality, objects communicate with each other by means of assuming roles to establish collaboration, and then can adaptively change their roles to obtain other intera...
Supasit Monpratarnchai, Tamai Tetsuo
ACSAC
2008
IEEE
14 years 3 months ago
The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies
Role hierarchies are fundamental to the role based access control (RBAC) model. The notion of role hierarchy is a well understood concept that allows senior roles to inherit the p...
Qi Guo, Jaideep Vaidya, Vijayalakshmi Atluri
AIMS
2008
Springer
13 years 10 months ago
A Role-Based Infrastructure for the Management of Dynamic Communities
Abstract. This paper addresses the problem of specifying and establishing secure collaborations between autonomous entities that need to interact and depend on each other in order ...
Alberto E. Schaeffer Filho, Emil Lupu, Morris Slom...
ICECCS
2005
IEEE
108views Hardware» more  ICECCS 2005»
14 years 2 months ago
Evolving Messaging Systems for Secure Role Based Messaging
This paper articulates a system design for the secure role based messaging model built based on existing messaging systems, public key infrastructures, and a privilege management ...
Gansen Zhao, David W. Chadwick
SACMAT
2005
ACM
14 years 2 months ago
Composing and combining policies under the policy machine
As a major component of any host, or network operating system, access control mechanisms come in a wide variety of forms, each with their individual attributes, functions, methods...
David F. Ferraiolo, Serban I. Gavrila, Vincent C. ...