Sciweavers

1140 search results - page 29 / 228
» A Purpose-Based Access Control Model
Sort
View
SACMAT
2011
ACM
12 years 10 months ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deļ¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...
JCS
2010
124views more  JCS 2010»
13 years 6 months ago
Verifying resource access control on mobile interactive devices
A model of resource access control is presented in which the access control to resources can employ user interaction to obtain the necessary permissions. This model is inspired by...
Frédéric Besson, Guillaume Dufay, Th...
JOT
2006
119views more  JOT 2006»
13 years 7 months ago
An efficient multiversion access control in a Temporal Object Oriented Database
Many data base applications require the storage and manipulation of different versions of data objects. To satisfy the diverse needs of these applications, current database system...
Gurusamy Arumugam, Muthuraman Thangaraj
ICFEM
2007
Springer
14 years 1 months ago
Formal Engineering of XACML Access Control Policies in VDM++
We present a formal, tool-supported approach to the design and maintenance of access control policies expressed in the eXtensible Access Control Markup Language (XACML). Our aim is...
Jeremy Bryans, John S. Fitzgerald
SAC
2005
ACM
14 years 1 months ago
An attribute-based access matrix model
In traditional access control models like MAC, DAC, and RBAC, authorization decisions are determined according to identities of subjects and objects, which are authenticated by a ...
Xinwen Zhang, Yingjiu Li, Divya Nalla