Sciweavers

3899 search results - page 25 / 780
» Argumentation for Access Control
Sort
View
SACMAT
2004
ACM
14 years 3 months ago
Security analysis in role-based access control
Ninghui Li, Mahesh V. Tripunitara
SACMAT
2003
ACM
14 years 3 months ago
An administration concept for the enterprise role-based access control model
Axel Kern, Andreas Schaad, Jonathan D. Moffett
FOSAD
2009
Springer
14 years 4 months ago
Logic in Access Control (Tutorial Notes)
Access control is central to security in computer systems. Over the years, there have been many efforts to explain and to improve access control, sometimes with logical ideas and t...
Martín Abadi
DEXAW
2003
IEEE
99views Database» more  DEXAW 2003»
14 years 3 months ago
A Model for Context-dependent Access Control for Web-based Services with Role-based Approach
Controlling access to resources is one of the most important protection goals for web-based services in practice. In general, access control requires identification of subjects t...
Ruben Wolf, Thomas Keinz, Markus Schneider
HICSS
2003
IEEE
107views Biometrics» more  HICSS 2003»
14 years 3 months ago
XML Access Control for Semantically Related XML Documents
The extensible markup language (XML) is a standard for describing information on the Internet and is quickly becoming the most preferred way to store and exchange information. The...
Vijay Parmar, Hongchi Shi, Su-Shing Chen