Sciweavers

872 search results - page 35 / 175
» An Access Control Language for a General Provenance Model
Sort
View
ACSAC
2003
IEEE
14 years 27 days ago
A Policy Validation Framework for Enterprise Authorization Specification
The validation of enterprise authorization specification for conformance to enterprise security policies requires an out-of-band framework in many situations since the enforcing a...
Ramaswamy Chandramouli
HICSS
2009
IEEE
105views Biometrics» more  HICSS 2009»
14 years 2 months ago
The Visual Wiki: A New Metaphor for Knowledge Access and Management
Successful knowledge management results in a competitive advantage in today’s information- and knowledge-rich industries. The elaboration and integration of emerging web-based t...
Christian Hirsch, John G. Hosking, John C. Grundy,...
SIS
2007
13 years 9 months ago
A General Approach to Securely Querying XML
Access control models for XML data can be classified in two major categories: node filtering and query rewriting systems. The first category includes approaches that use access ...
Ernesto Damiani, Majirus Fansi, Alban Gabillon, St...
MOBISYS
2007
ACM
14 years 7 months ago
Rendezvous-based access control for medical records in the pre-hospital environment
We present rendezvous-based access control for access control in the pre-hospital environment. Rendezvous-based access control is a simple cryptographic access control method that...
Feike W. Dillema, Simone Lupetti
TDSC
2008
152views more  TDSC 2008»
13 years 7 months ago
Towards Formal Verification of Role-Based Access Control Policies
Specifying and managing access control policies is a challenging problem. We propose to develop formal verification techniques for access control policies to improve the current s...
Somesh Jha, Ninghui Li, Mahesh V. Tripunitara, Qih...