Sciweavers

2009 search results - page 23 / 402
» A privacy-aware access control system
Sort
View
JNW
2007
135views more  JNW 2007»
13 years 7 months ago
Access Control in Decentralised Publish/Subscribe Systems
Abstract— Publish/subscribe has emerged as an attractive communication paradigm for building Internet-wide distributed systems by decoupling message senders from receivers. Large...
Lauri I. W. Pesonen, David M. Eyers, Jean Bacon
COMPSAC
2001
IEEE
13 years 11 months ago
Designing Role Hierarchies for Access Control in Workflow Systems
he correspondence between the role abstraction in Role-based Access Control (RBAC) and the notion of organizational positions, it seems easy to construct role hierarchies. This is...
Reinhardt A. Botha, Jan H. P. Eloff
JSW
2007
124views more  JSW 2007»
13 years 7 months ago
Shibboleth as a Tool for Authorized Access Control to the Subversion Repository System
—Shibboleth is an architecture and protocol for allowing users to authenticate and be authorized to use a remote resource by logging into the identity management system that is m...
Linh Ngo, Amy W. Apon
MVA
2000
111views Computer Vision» more  MVA 2000»
13 years 9 months ago
A Face Recognition Terminal with Effective Illumination for Access Control Systems
In this paper, a high-performance face recognition terminal for access control systems is described. The terminal is specially designed to acquire stable face patterns for reliabl...
Toshio Sato, Hiroshi Sukegawa, Kentaro Yokoi, Akio...
ISSA
2004
13 years 9 months ago
A Logic-Based Access Control Approach For Web Services
Web Services technology enables organisations to exploit software as a service. Services are accessed by method invocations. Method interfaces are described and published, and may...
Marijke Coetzee