Sciweavers

481 search results - page 61 / 97
» Analyzing and Managing Role-Based Access Control Policies
Sort
View
SACMAT
2003
ACM
14 years 2 months ago
PBDM: a flexible delegation model in RBAC
Role-based access control (RBAC) is recognized as an efficient access control model for large organizations. Most organizations have some business rules related to access control...
Xinwen Zhang, Sejong Oh, Ravi S. Sandhu
SACMAT
2009
ACM
14 years 1 months ago
A formal framework to elicit roles with business meaning in RBAC systems
The role-based access control (RBAC) model has proven to be cost effective to reduce the complexity and costs of access permission management. To maximize the advantages offered...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
SACMAT
2010
ACM
14 years 1 months ago
Mining roles with noisy data
There has been increasing interest in automatic techniques for generating roles for role based access control, a process known as role mining. Most role mining approaches assume t...
Ian Molloy, Ninghui Li, Yuan (Alan) Qi, Jorge Lobo...
SACMAT
2010
ACM
13 years 7 months ago
Role mining based on weights
Role mining from the existing permissions has been widely applied to aid the process of migrating to an RBAC system. While all permissions are treated evenly in previous approache...
Xiaopu Ma, Ruixuan Li, Zhengding Lu
JSAC
2007
107views more  JSAC 2007»
13 years 8 months ago
Admission control in data transfers over lightpaths
—The availability of optical network infrastructure and appropriate user control software has recently made it possible for scientists to establish end-to-end circuits across mul...
Wojciech M. Golab, Raouf Boutaba