Sciweavers

288 search results - page 12 / 58
» Algebra and logic for access control
Sort
View
ICDE
2008
IEEE
140views Database» more  ICDE 2008»
14 years 9 months ago
A Security Punctuation Framework for Enforcing Access Control on Streaming Data
The management of privacy and security in the context of data stream management systems (DSMS) remains largely an unaddressed problem to date. Unlike in traditional DBMSs where acc...
Rimma V. Nehme, Elke A. Rundensteiner, Elisa Berti...
ICTAC
2005
Springer
14 years 1 months ago
Representation and Reasoning on RBAC: A Description Logic Approach
Abstract. Role-based access control (RBAC) is recognized as an excellent model for access control in large-scale networked applications. Formalization of RBAC in a logical approach...
Chen Zhao, NuerMaimaiti Heilili, Shengping Liu, Zu...
SACMAT
2009
ACM
14 years 2 months ago
Access control policy combining: theory meets practice
Many access control policy languages, e.g., XACML, allow a policy to contain multiple sub-policies, and the result of the policy on a request is determined by combining the result...
Ninghui Li, Qihua Wang, Wahbeh H. Qardaji, Elisa B...
OTM
2007
Springer
14 years 1 months ago
A Role and Attribute Based Access Control System Using Semantic Web Technologies
We show how Semantic Web technologies can be used to build an access control system. We follow the role-based access control approach (RBAC) and extend it with contextual attribute...
Lorenzo Cirio, Isabel F. Cruz, Roberto Tamassia
IADIS
2004
13 years 9 months ago
Web server authorisation with the policyupdater access control system
The PolicyUpdater1 system is a generic access control system that provides policy evaluations and dynamic policy updates. These functions are achieved by the use of a logic-based ...
Vino Fernando Crescini, Yan Zhang, Weiyuan Wang