Sciweavers

316 search results - page 13 / 64
» Conditional Privacy-Aware Role Based Access Control
Sort
View
COMPUTER
2010
91views more  COMPUTER 2010»
13 years 7 months ago
Adding Attributes to Role-Based Access Control
D. Richard Kuhn, Edward J. Coyne, Timothy R. Weil
IEEESP
2007
62views more  IEEESP 2007»
13 years 7 months ago
A Critique of the ANSI Standard on Role-Based Access Control
Ninghui Li, Ji-Won Byun, Elisa Bertino
AC
1998
Springer
13 years 7 months ago
Role-Based Access Control
Ravi S. Sandhu
ISORC
2008
IEEE
14 years 2 months ago
MRBAC: Hierarchical Role Management and Security Access Control for Distributed Multimedia Systems
In this paper, a Role-based Access Control (RBAC) model is applied and extended to a multimedia version called Multi-Role Based Access Control (MRBAC), which can fully support the...
Na Zhao, Min Chen, Shu-Ching Chen, Mei-Ling Shyu
SACMAT
2003
ACM
14 years 26 days ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf