Sciweavers

98 search results - page 9 / 20
» Designing Role Hierarchies for Access Control in Workflow Sy...
Sort
View
VLDB
1998
ACM
134views Database» more  VLDB 1998»
13 years 11 months ago
Design, Implementation, and Performance of the LHAM Log-Structured History Data Access Method
Numerous applications such as stock market or medical information systems require that both historical and current data be logically integrated into a temporal database. The under...
Peter Muth, Patrick E. O'Neil, Achim Pick, Gerhard...
ACSAC
2002
IEEE
14 years 16 days ago
A Financial Institution's Legacy Mainframe Access Control System in Light of the Proposed NIST RBAC Standard
In this paper we describe a mainframe access control system (DENT) and its associated delegated administration tool (DSAS) that were used in a financial institution for over 20 y...
Andrew D. Marshall
FOSAD
2009
Springer
14 years 2 months ago
Logic in Access Control (Tutorial Notes)
Access control is central to security in computer systems. Over the years, there have been many efforts to explain and to improve access control, sometimes with logical ideas and t...
Martín Abadi
ESORICS
2009
Springer
14 years 8 months ago
A Privacy Preservation Model for Facebook-Style Social Network Systems
Abstract. Recent years have seen unprecedented growth in the popularity of social network systems, with Facebook being an archetypical example. The access control paradigm behind t...
Philip W. L. Fong, Mohd M. Anwar, Zhen Zhao
WAIM
2000
Springer
13 years 11 months ago
An Optimal Locking Scheme in Object-Oriented Database Systems
In this paper, a locking-based concurrency control scheme is presented for object-oriented databases (OODBs). It is designed for controlling accesses to class hierarchy, which is ...
Woochun Jun, Le Gruenwald