Sciweavers

1140 search results - page 75 / 228
» A Purpose-Based Access Control Model
Sort
View
NIPS
2004
13 years 9 months ago
Theories of Access Consciousness
Theories of access consciousness address how it is that some mental states but not others are available for evaluation, choice behavior, and verbal report. Farah, O'Reilly, a...
Michael D. Colagrosso, Michael C. Mozer
ACSAC
1999
IEEE
14 years 14 days ago
Napoleon: A Recipe for Workflow
This paper argues that Napoleon, a flexible, role-based access control (RBAC) modeling environment, is also a practical solution for enforcing business process control, or workflo...
Charles N. Payne, D. J. Thomsen, J. Bogle, Richard...
CCS
2000
ACM
14 years 14 days ago
XML document security based on provisional authorization
The extensible markup language (XML) is a promising standard for describing semi-structured information and contents on the Internet. When XML comes to be a widespread data encodi...
Michiharu Kudo, Satoshi Hada
CONTEXT
2003
Springer
14 years 1 months ago
A Generic Framework for Context-Based Distributed Authorizations
In conventional security systems, protected resources such as documents, hardware devices and software applications follow an On/Off access policy. On, allows to grant access and ...
Ghita Kouadri Mostéfaoui, Patrick Bré...
LCN
2007
IEEE
14 years 2 months ago
Performance Analysis of Single Cell IEEE 802.16e Wireless MAN
—The IEEE 802.16 standard (commonly known as WiMAX), which has emerged as a broadband wireless access technology, is capable of delivering very high data rates. The grant/request...
Thierry Peyre, Rachid El Azouzi