Sciweavers

804 search results - page 23 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
SIGMOD
2010
ACM
155views Database» more  SIGMOD 2010»
15 years 2 months ago
Search in social networks with access control
More and more important data is accumulated inside social networks. Limiting the flow of private information across a social network is very important, and most social networks pr...
Truls Amundsen Bjørklund, Michaela Göt...
IPCCC
2007
IEEE
15 years 10 months ago
Applications of the Oriented Permission Role-Based Access Control Model
Role-based access control and role hierarchies have been the subject of considerable research in recent years. In this paper, we consider three useful applications of a new role-b...
Liang Chen, Jason Crampton
SACMAT
2005
ACM
15 years 9 months ago
Purpose based access control of complex data for privacy protection
As privacy becomes a major concern for both consumers and enterprises, many research efforts have been devoted to the development of privacy protecting technology. We recently pr...
Ji-Won Byun, Elisa Bertino, Ninghui Li
WETICE
2002
IEEE
15 years 9 months ago
Towards an Access Control System for Mobile Peer-to-Peer Collaborative Environments
Access control is one of the key requirements in enterprise security. A number of approaches in distributed systems have been designed that support various (new) paradigms such as...
Pascal Fenkam, Schahram Dustdar, Engin Kirda, Gera...
IEEECIT
2010
IEEE
15 years 2 months ago
Enabling Privacy-preserving Credential-based Access Control with XACML and SAML
—In this paper we describe extensions to the access control industry standards XACML and SAML to enable privacy-preserving and credential-based access control. Rather than assumi...
Claudio Agostino Ardagna, Sabrina De Capitani di V...