Sciweavers

221 search results - page 30 / 45
» Delegation in Role-Based Access Control
Sort
View
ICCS
2001
Springer
14 years 3 months ago
The Policy Machine for Security Policy Management
Abstract. Many different access control policies and models have been developed to suit a variety of goals; these include Role-Based Access Control, One-directional Information Flo...
Vincent C. Hu, Deborah A. Frincke, David F. Ferrai...
ENTCS
2006
123views more  ENTCS 2006»
13 years 11 months ago
Nonmonotonic Trust Management for P2P Applications
Community decisions about access control in virtual communities are non-monotonic in nature. This means that they cannot be expressed in current, monotonic trust management langua...
Marcin Czenko, Ha Tran, Jeroen Doumen, Sandro Etal...
IFIP
2009
Springer
13 years 8 months ago
Model Checking of Security-Sensitive Business Processes
Security-sensitive business processes are business processes that must comply with security requirements (e.g. authorization constraints). In previous works it has been shown that ...
Alessandro Armando, Serena Elisa Ponta
FGCN
2008
IEEE
196views Communications» more  FGCN 2008»
14 years 5 months ago
SS-RBAC: Secure Query Processing Model for Semantic Sensor Networks
This paper proposes a novel secure query processing model for semantic sensor networks. A semantic sensor network (SSN) is a sensor network which includes semantics of sensory dat...
Dongwon Jeong, Hyejin Jeong, Young-Sik Jeong
SERP
2010
13 years 8 months ago
Role Explosion: Acknowledging the Problem
- In large enterprises subject to constant employee turnover and challenging security policies, the administration of Role-based Access Control (RBAC) is a daunting task that is of...
Aaron Elliott, Scott Knight