Sciweavers

316 search results - page 48 / 64
» Conditional Privacy-Aware Role Based Access Control
Sort
View
RBAC
1998
84views more  RBAC 1998»
13 years 11 months ago
Decentralized User-role Assignment for Web-based Intranets
The intricacy of security administration is one of the most challenging problems in large networked systems. This problem is especially serious in the Web environment, which consi...
Ravi S. Sandhu, Joon S. Park
CCS
2008
ACM
13 years 12 months ago
Towards automatic reverse engineering of software security configurations
The specifications of an application's security configuration are crucial for understanding its security policies, which can be very helpful in security-related contexts such...
Rui Wang 0010, XiaoFeng Wang, Kehuan Zhang, Zhuowe...
ACSAC
2005
IEEE
14 years 3 months ago
Intrusion Detection in RBAC-administered Databases
A considerable effort has been recently devoted to the development of Database Management Systems (DBMS) which guarantee high assurance security and privacy. An important componen...
Elisa Bertino, Ashish Kamra, Evimaria Terzi, Athen...
ICECCS
2008
IEEE
168views Hardware» more  ICECCS 2008»
14 years 4 months ago
Ubiquitous Service Regulation Based on Dynamic Rules
Ubiquitous computing systems can be regarded as open systems where heterogeneous and previously unknown entities may spontaneously interact, due to intrinsic mobility of users and...
José Viterbo Filho, Markus Endler, Jean-Pie...
ISSRE
2006
IEEE
14 years 4 months ago
A State Exploration-Based Approach to Testing Java Monitors
A Java monitor is a Java class that defines one or more synchronized methods. Unlike a regular object, a Java monitor object is intended to be accessed by multiple threads simulta...
Yu Lei, Richard H. Carver, David Chenho Kung, Vidu...