Sciweavers

1140 search results - page 19 / 228
» A Purpose-Based Access Control Model
Sort
View
IPCCC
2007
IEEE
14 years 2 months ago
Applications of the Oriented Permission Role-Based Access Control Model
Role-based access control and role hierarchies have been the subject of considerable research in recent years. In this paper, we consider three useful applications of a new role-b...
Liang Chen, Jason Crampton
SIS
2008
13 years 9 months ago
An Access Control Model for Location based Services
In this paper we propose an access control model for use by a trusted middleware infrastructure, which is part of an architecture that supports the operation of Location Based Serv...
Cameron Ross Dunne, Thibault Candebat, David Gray
AINA
2007
IEEE
14 years 2 months ago
Flexible and Manageable Delegation of Authority in RBAC
One of the most challenging problems in managing large networks is the complexity of security administration. Role based access control (RBAC) has become the predominant model for...
Tuan-Anh Nguyen, Linying Su, George Inman, David W...
EDBT
2006
ACM
177views Database» more  EDBT 2006»
14 years 7 months ago
Authorization-Transparent Access Control for XML Under the Non-Truman Model
In authorization-transparent access control, users formulate their queries against the database schema rather than against authorization views that transform and hide data. The Tru...
Alberto O. Mendelzon, Renée J. Miller, Yaro...
WOSP
2010
ACM
14 years 2 months ago
Analytical modeling of lock-based concurrency control with arbitrary transaction data access patterns
Nowadays the 2-Phase-Locking (2PL) concurrency control algorithm still plays a core rule in the construction of transactional systems (e.g. database systems and transactional memo...
Pierangelo di Sanzo, Roberto Palmieri, Bruno Cicia...