Sciweavers

114 search results - page 19 / 23
» Cooperative role-based administration
Sort
View
CCGRID
2006
IEEE
14 years 3 months ago
A Shibboleth-Protected Privilege Management Infrastructure for e-Science Education
Simplifying access to and usage of large scale compute resources via the Grid is of critical importance to encourage the uptake of e-Research. Security is one aspect that needs to...
J. P. Watt, Oluwafemi Ajayi, Jipu Jiang, Jos Koets...
SACMAT
2006
ACM
14 years 3 months ago
Fine-grained role-based delegation in presence of the hybrid role hierarchy
Delegation of authority is an important process that needs to be captured by any access control model. In role-based access control models, delegation of authority involves delega...
James B. D. Joshi, Elisa Bertino
SACMAT
2010
ACM
14 years 2 months ago
Mining roles with noisy data
There has been increasing interest in automatic techniques for generating roles for role based access control, a process known as role mining. Most role mining approaches assume t...
Ian Molloy, Ninghui Li, Yuan (Alan) Qi, Jorge Lobo...
IMCS
2007
77views more  IMCS 2007»
13 years 9 months ago
Incident response requirements for distributed security information management systems
Purpose – Security information management systems (SIMs) have been providing a unified distributed platform for the efficient management of security information produced by co...
Sarandis Mitropoulos, Dimitrios Patsos, Christos D...
CHI
2004
ACM
14 years 10 months ago
Transcendent communication: location-based guidance for large-scale public spaces
Many studies have been conducted on supporting communication in home and office spaces, but relatively few studies have explored supporting communication in large-scale public spa...
Hideyuki Nakanishi, Satoshi Koizumi, Toru Ishida, ...