Sciweavers

726 search results - page 36 / 146
» An Access Control Scheme for Protecting Personal Data
Sort
View
CIKM
2004
Springer
14 years 29 days ago
QFilter: fine-grained run-time XML access control via NFA-based query rewriting
At present, most of the state-of-the-art solutions for XML access controls are either (1) document-level access control techniques that are too limited to support fine-grained sec...
Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu
EUROSYS
2010
ACM
14 years 19 days ago
Policy-based access control for weakly consistent replication
Combining access control with weakly consistent replication presents a challenge if the resulting system is to support eventual consistency. If authorization policy can be tempora...
Ted Wobber, Thomas L. Rodeheffer, Douglas B. Terry
DBSEC
2006
115views Database» more  DBSEC 2006»
13 years 9 months ago
Creating Objects in the Flexible Authorization Framework
Access control is a crucial concern to build secure IT systems and, more specifically, to protect the confidentiality of information. However, access control is necessary, but not ...
Nicola Zannone, Sushil Jajodia, Duminda Wijesekera
SACMAT
2003
ACM
14 years 24 days ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
SELMAS
2004
Springer
14 years 27 days ago
Adaptive Access Control in Coordination-Based Mobile Agent Systems
The increased pervasiveness of mobile devices like cell phones, PDAs, and laptops draws attention to the need for coordination among these networked devices. The very nature of the...
Christine Julien, Jamie Payton, Gruia-Catalin Roma...