Sciweavers

186 search results - page 20 / 38
» A four-layer model for security of digital rights management
Sort
View
RBAC
1997
135views more  RBAC 1997»
13 years 9 months ago
Reconciling role based management and role based access control
Role Based Access Control is only a subset of the security management and distributed systems management. Yet, the characteristics and use of the role objects in RBAC or Role Base...
Emil Lupu, Morris Sloman
ESORICS
2008
Springer
13 years 9 months ago
On the Security of Delegation in Access Control Systems
Delegation is a mechanism that allows a user A to act on another user B's behalf by making B's access rights available to A. It is well recognized as an important mechani...
Qihua Wang, Ninghui Li, Hong Chen
SACMAT
2003
ACM
14 years 24 days ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
CCS
2006
ACM
13 years 11 months ago
Virtual monotonic counters and count-limited objects using a TPM without a trusted OS
A trusted monotonic counter is a valuable primitive that enables a wide variety of highly scalable offline and decentralized applications that would otherwise be prone to replay a...
Luis F. G. Sarmenta, Marten van Dijk, Charles W. O...
IMF
2007
13 years 9 months ago
A Common Process Model for Incident Response and Computer Forensics
: Incident Response and Computer Forensics are two areas with similar goals but distinct process models. While in both cases the goal is to investigate computer security incidents ...
Felix C. Freiling, Bastian Schwittay