Sciweavers

102 search results - page 6 / 21
» Engineering of Role Permission Assignments
Sort
View
ICDE
2008
IEEE
129views Database» more  ICDE 2008»
14 years 8 months ago
Optimal Boolean Matrix Decomposition: Application to Role Engineering
Abstract-- A decomposition of a binary matrix into two matrices gives a set of basis vectors and their appropriate combination to form the original matrix. Such decomposition solut...
Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri
RBAC
2000
129views more  RBAC 2000»
13 years 8 months ago
Enabling technologies for role based online decision engines
: Enabling Technologies for Role Based Online Decision Engines Thomas Hildmann, Thomas Gebhardt 22-Feb-2000 The goal of our work at the Technical University of Berlin is to develop...
Thomas Gebhardt, Thomas Hildmann
SAC
2010
ACM
14 years 2 months ago
A simple role mining algorithm
Complex organizations need to establish access control policies in order to manage access to restricted resources. Role Based Access Control paradigm has been introduced in ’90 ...
Carlo Blundo, Stelvio Cimato
XPU
2004
Springer
14 years 25 days ago
Roles in Agile Software Development Teams
One of the key elements in describing a software development method is the roles that are assigned to the members of the software team. This article describes our experience in ass...
Yael Dubinsky, Orit Hazzan
SELMAS
2005
Springer
14 years 29 days ago
Engineering Organization-Based Multiagent Systems
In this paper, we examine the Multiagent Systems Engineering (MaSE) methodology and its applicability to developing organization-based multiagent systems, which are especially rele...
Scott A. DeLoach