Sciweavers

481 search results - page 43 / 97
» Analyzing and Managing Role-Based Access Control Policies
Sort
View
SACMAT
2003
ACM
14 years 2 months ago
Cooperative role-based administration
In large organizations the administration of access privileges (such as the assignment of an access right to a user in a particular role) is handled cooperatively through distribu...
Horst Wedde, Mario Lischka
ESORICS
2004
Springer
14 years 2 months ago
Portable and Flexible Document Access Control Mechanisms
We present and analyze portable access control mechanisms for large data repositories, in that the customized access policies are stored on a portable device (e.g., a smart card). ...
Mikhail J. Atallah, Marina Bykova
ANCS
2010
ACM
13 years 6 months ago
A new TCB cache to efficiently manage TCP sessions for web servers
TCP/IP, the most commonly used network protocol, consumes a significant portion of time in Internet servers. While a wide spectrum of studies has been done to reduce its processin...
Guangdeng Liao, Laxmi N. Bhuyan, Wei Wu, Heeyeol Y...
IJNSEC
2006
112views more  IJNSEC 2006»
13 years 8 months ago
An Access Control System with Time-constraint Using Support Vector Machines
Access control is an important issue in information security. It is a necessary mechanism for protecting data in a computer system. In this paper, we apply support vector machines...
Chin-Chen Chang, Iuon-Chang Lin, Chia-Te Liao
CSE
2009
IEEE
14 years 3 months ago
Reputation-Based Ontology Alignment for Autonomy and Interoperability in Distributed Access Control
Abstract—Vocabulary alignment is a main challenge in distributed access control as peers should understand each other’s policies unambiguously. Ontologies enable mutual underst...
Daniel Trivellato, Fred Spiessens, Nicola Zannone,...