Sciweavers

804 search results - page 24 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
149
Voted
ACSAC
2002
IEEE
15 years 9 months ago
Advanced Features for Enterprise-Wide Role-Based Access Control
The administration of users and access rights in large enterprises is a complex and challenging task. Roles are a powerful concept for simplifying access control, but their implem...
Axel Kern
CSREASAM
2009
15 years 5 months ago
Incremental Information Flow Analysis of Role Based Access Control
Role-Based Access Control (RBAC) has been widely used for expressing access control policies. Although RBAC provides flexible mechanisms to control the access to information, it do...
Mikhail I. Gofman, Ruiqi Luo, Jian He, Yingbin Zha...
CONCURRENCY
2008
105views more  CONCURRENCY 2008»
15 years 4 months ago
Coordinating access control in grid services
We describe how to control the cumulative use of distributed grid resources by using coordination aware policy decision points (coordinated PDPs) and an SQL database to hold "...
David W. Chadwick, Linying Su, Romain Laborde
CSFW
2006
IEEE
15 years 10 months ago
Policy Analysis for Administrative Role Based Access Control
Role-Based Access Control (RBAC) is a widely used model for expressing access control policies. In large organizations, the RBAC policy may be collectively managed by many adminis...
Amit Sasturkar, Ping Yang, Scott D. Stoller, C. R....
COMPSAC
2002
IEEE
15 years 9 months ago
Hybrid Role Hierarchy for Generalized Temporal Role Based Access Control Model
Generalized Temporal Role Based Access Control (GTRBAC) model that captures an exhaustive set of temporal constraint needs for access control has recently been proposed. GTRBAC’...
James Joshi, Elisa Bertino, Arif Ghafoor