Sciweavers

798 search results - page 17 / 160
» Comparing the expressive power of access control models
Sort
View
CCS
2008
ACM
13 years 9 months ago
On spatio-temporal constraints and inheritance in role-based access control
Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based acces...
Liang Chen, Jason Crampton
CODASPY
2011
12 years 11 months ago
Relationship-based access control: protection model and policy language
Social Network Systems pioneer a paradigm of access control that is distinct from traditional approaches to access control. Gates coined the term Relationship-Based Access Control...
Philip W. L. Fong
GRID
2005
Springer
14 years 1 months ago
Policy administration control and delegation using XACML and Delegent
Abstract— In this paper we present a system permitting controlled policy administration and delegation using the XACML access control system. The need for these capabilities stem...
Ludwig Seitz, Erik Rissanen, Thomas Sandholm, Baba...
ICNS
2006
IEEE
14 years 1 months ago
Building Distributed Access Control System Using Service-Oriented Programming Model
– Service-Oriented Programming Model is a new methodology for building service-oriented applications. In the Service-Oriented Programming Model, an application is assembled from ...
Ivan Zuzak, Sinisa Srbljic, Ivan Benc
BMCBI
2008
125views more  BMCBI 2008»
13 years 7 months ago
MAID : An effect size based model for microarray data integration across laboratories and platforms
Background: Gene expression profiling has the potential to unravel molecular mechanisms behind gene regulation and identify gene targets for therapeutic interventions. As microarr...
Ivan Borozan, Limin Chen, Bryan Paeper, Jenny E. H...