Sciweavers

481 search results - page 15 / 97
» Analyzing and Managing Role-Based Access Control Policies
Sort
View
EUC
2005
Springer
14 years 1 months ago
Access Policy Sheet for Access Control in Fine-Grained XML
Abstract. We propose an access control scheme for developing authorization rules for XML documents, allowing flexible data granularity and authorization propagation. To simplify t...
Jing Wu, Yi Mu, Jennifer Seberry, Chun Ruan
SACMAT
2006
ACM
14 years 1 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
COMPSAC
2007
IEEE
13 years 11 months ago
Conformance Checking of Access Control Policies Specified in XACML
Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to whi...
Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie
ICDE
2007
IEEE
164views Database» more  ICDE 2007»
14 years 1 months ago
Multi-session Separation of Duties (MSoD) for RBAC
Separation of duties (SoD) is a key security requirement for many business and information systems. Role Based Access Controls (RBAC) is a relatively new paradigm for protecting i...
David W. Chadwick, Wensheng Xu, Sassa Otenko, Roma...