Sciweavers

139 search results - page 11 / 28
» Exploiting information relationships for access control in p...
Sort
View
SACMAT
2003
ACM
14 years 24 days ago
An access control model for dynamic client-side content
The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resource...
Adam Hess, Kent E. Seamons
SAINT
2006
IEEE
14 years 1 months ago
Dynamic Configuration of Semantic-Based Service Provisioning to Portable Devices
Context-awareness is starting to emerge as a key driving principle for the design and provisioning of pervasive services in pervasive computing environments. Semantic languages se...
Antonio Corradi, Rebecca Montanari, Alessandra Ton...
SAC
2005
ACM
14 years 1 months ago
An attribute-based access matrix model
In traditional access control models like MAC, DAC, and RBAC, authorization decisions are determined according to identities of subjects and objects, which are authenticated by a ...
Xinwen Zhang, Yingjiu Li, Divya Nalla
CSCWD
2008
Springer
13 years 9 months ago
Authorization approaches for advanced permission-role assignments
Role-based access control (RBAC) has been proven to be a flexible and useful access control model for information sharing in distributed collaborative environments. Permission-rol...
Hua Wang, Jianming Yong, Jiuyong Li, Min Peng
ISI
2006
Springer
13 years 7 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu