Sciweavers

114 search results - page 7 / 23
» Cooperative role-based administration
Sort
View
RBAC
1998
84views more  RBAC 1998»
14 years 6 days ago
Decentralized User-role Assignment for Web-based Intranets
The intricacy of security administration is one of the most challenging problems in large networked systems. This problem is especially serious in the Web environment, which consi...
Ravi S. Sandhu, Joon S. Park
SERP
2010
13 years 8 months ago
Role Explosion: Acknowledging the Problem
- In large enterprises subject to constant employee turnover and challenging security policies, the administration of Role-based Access Control (RBAC) is a daunting task that is of...
Aaron Elliott, Scott Knight
MKWI
2008
169views Business» more  MKWI 2008»
14 years 8 days ago
A Portal for Cross-Administrative Acquisition and Specification of Software Requirements
: For the development of software requirements within a team, efficient communication and a systematic approach are necessary. Because of the complexity of the task, the need for s...
Norman Riegel, Holger Branding, Michael Geisser, T...
IJNSEC
2007
83views more  IJNSEC 2007»
13 years 10 months ago
Secure Logging for Irrefutable Administration
This paper presents a method that allows for securely saving a temporal sequence of data (log lines) in a file. Log lines are signed by an authority, and are thus unalterable wit...
Paolo Dal Checco, Francesco Bergadano, Davide Cava...
ACSAC
2002
IEEE
14 years 3 months ago
Access Control for Active Spaces
Active Spaces are physical spaces augmented with heterogeneous computing and communication devices along with supporting software infrastructure. This integration facilitates coll...
Geetanjali Sampemane, Prasad Naldurg, Roy H. Campb...