Sciweavers

1140 search results - page 3 / 228
» A Purpose-Based Access Control Model
Sort
View
CORR
2010
Springer
116views Education» more  CORR 2010»
13 years 4 months ago
Managing Delegation in Access Control Models
In the field of access control, delegation is an important aspect that is considered as a part of the administration mechanism. Thus, a complete access control must provide a flex...
Meriam Ben-Ghorbel-Talbi, Frédéric C...
RBAC
1997
234views more  RBAC 1997»
13 years 8 months ago
Comparing simple role based access control models and access control lists
The RBAC metaphor is powerful in its ability to express access control policy in terms of the way in which administrators view organizations. The functionality of simple Role Base...
John F. Barkley
ARESEC
2011
145views more  ARESEC 2011»
12 years 7 months ago
An Attribute Based Framework for Risk-Adaptive Access Control Models
—The concept of risk-based adaptive access control (RAdAC, pronounced Raid-ack) has been recently introduced in the literature. It seeks to automatically (or semi-automatically) ...
Savith Kandala, Ravi S. Sandhu, Venkata Bhamidipat...
CODASPY
2011
12 years 10 months ago
Relationship-based access control: protection model and policy language
Social Network Systems pioneer a paradigm of access control that is distinct from traditional approaches to access control. Gates coined the term Relationship-Based Access Control...
Philip W. L. Fong
IJNSEC
2010
145views more  IJNSEC 2010»
13 years 1 months ago
Formal Specification of Common Criteria Based Access Control Policy Model
One of the major threats that an enterprise Information system networks are facing today is the Insider threat. As part of the Insider Threat study, lack of an effective access co...
Manpreet Singh, Manjeet S. Patterh