Sciweavers

1140 search results - page 75 / 228
» A Purpose-Based Access Control Model
Sort
View
135
Voted
NIPS
2004
15 years 4 months ago
Theories of Access Consciousness
Theories of access consciousness address how it is that some mental states but not others are available for evaluation, choice behavior, and verbal report. Farah, O'Reilly, a...
Michael D. Colagrosso, Michael C. Mozer
131
Voted
ACSAC
1999
IEEE
15 years 7 months ago
Napoleon: A Recipe for Workflow
This paper argues that Napoleon, a flexible, role-based access control (RBAC) modeling environment, is also a practical solution for enforcing business process control, or workflo...
Charles N. Payne, D. J. Thomsen, J. Bogle, Richard...
125
Voted
CCS
2000
ACM
15 years 7 months ago
XML document security based on provisional authorization
The extensible markup language (XML) is a promising standard for describing semi-structured information and contents on the Internet. When XML comes to be a widespread data encodi...
Michiharu Kudo, Satoshi Hada
138
Voted
CONTEXT
2003
Springer
15 years 8 months ago
A Generic Framework for Context-Based Distributed Authorizations
In conventional security systems, protected resources such as documents, hardware devices and software applications follow an On/Off access policy. On, allows to grant access and ...
Ghita Kouadri Mostéfaoui, Patrick Bré...
120
Voted
LCN
2007
IEEE
15 years 9 months ago
Performance Analysis of Single Cell IEEE 802.16e Wireless MAN
—The IEEE 802.16 standard (commonly known as WiMAX), which has emerged as a broadband wireless access technology, is capable of delivering very high data rates. The grant/request...
Thierry Peyre, Rachid El Azouzi