Sciweavers

798 search results - page 16 / 160
» Comparing the expressive power of access control models
Sort
View
CSFW
1995
IEEE
13 years 11 months ago
Implementation of a discretionary access control model for script-based systems
Powerful applications can be implemented using command scripts. A command script is a program written by one user, called a writer, and made available to another user, called the ...
Trent Jaeger, Atul Prakash
KRDB
2003
117views Database» more  KRDB 2003»
13 years 9 months ago
On a Unifying Framework for Comparing Knowledge Representation Schemes
Given the numerous knowledge representation models (KR-schemes) that have been proposed, it would be desirable to have a formal, unifying model for the description of a KR-scheme,...
Giorgos Flouris, Dimitris Plexousakis, Grigoris An...
SOUPS
2006
ACM
14 years 1 months ago
Intentional access management: making access control usable for end-users
The usability of access control mechanisms in modern distributed systems has been widely criticized but little studied. In this paper, we carefully examine one such widely deploye...
Xiang Cao, Lee Iverson
ACSW
2006
13 years 9 months ago
A method for access authorisation through delegation networks
Owners of systems and resources usually want to control who can access them. This must be based on having a process for authorising certain parties, combined with mechanisms for e...
Audun Jøsang, Dieter Gollmann, Richard Au
SACMAT
2004
ACM
14 years 1 months ago
A role-based approach to access control for XML databases
In order to provide a general access control methodology for parts of XML documents, we propose combining rolebased access control as found in the Role Graph Model, with a methodo...
Jingzhu Wang, Sylvia L. Osborn