Sciweavers

316 search results - page 22 / 64
» Conditional Privacy-Aware Role Based Access Control
Sort
View
SACMAT
2004
ACM
14 years 3 months ago
X-GTRBAC admin: a decentralized administration model for enterprise wide access control
Access control in enterprises is a key research area in the realm of Computer Security because of the unique needs of the target enterprise. As the enterprise typically has large ...
Rafae Bhatti, James Joshi, Elisa Bertino, Arif Gha...
COORDINATION
2005
Springer
14 years 3 months ago
Coordination Systems in Role-Based Adaptive Software
Software systems are becoming more open, distributed, pervasive, and connected. In such systems, the relationships between loosely-coupled application elements become non-determini...
Alan W. Colman, Jun Han
SACMAT
2010
ACM
13 years 8 months ago
Role mining based on weights
Role mining from the existing permissions has been widely applied to aid the process of migrating to an RBAC system. While all permissions are treated evenly in previous approache...
Xiaopu Ma, Ruixuan Li, Zhengding Lu
ICDCSW
2003
IEEE
14 years 3 months ago
Privilege Delegation and Agent-Oriented Access Control in Naplet
Access control in existing Java-based mobile agents is mostly based on code source due to limitations of early Java security architecture. That is, authorization is based on where...
Cheng-Zhong Xu, Song Fu
SACMAT
2009
ACM
14 years 2 months ago
A formal framework to elicit roles with business meaning in RBAC systems
The role-based access control (RBAC) model has proven to be cost effective to reduce the complexity and costs of access permission management. To maximize the advantages offered...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...