Sciweavers

804 search results - page 68 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
ICTCS
2005
Springer
15 years 10 months ago
Checking Risky Events Is Enough for Local Policies
Abstract. An extension of the λ-calculus is proposed to study historybased access control. It allows for parametrized security policies with a possibly nested, local scope. To gov...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
CCS
2000
ACM
15 years 9 months ago
Security enhanced mobile agents
This paper describes a security model for mobile agent based systems. The model defines the notion of a security-enhanced agent and outlines security management components in agen...
Vijay Varadharajan
ACSAC
2002
IEEE
15 years 9 months ago
A Model for Attribute-Based User-Role Assignment
The Role-Based Access Control (RBAC) model is traditionally used to manually assign users to appropriate roles, based on a specific enterprise policy, thereby authorizing them to ...
Mohammad A. Al-Kahtani, Ravi S. Sandhu
FGCS
2008
107views more  FGCS 2008»
15 years 4 months ago
Dynamic security context management in Grid-based applications
This paper summarises ongoing research and recent results on the development of flexible access control infrastructure for complex resource provisioning in Grid-based collaborativ...
Yuri Demchenko, Olle Mulmo, Leon Gommans, Cees de ...
WWW
2001
ACM
16 years 5 months ago
WebGuard: A System for Web Content Protection
In this paper, we present WebGuard, a content protection system for Web documents. WebGuard allows content owners to exercise control over usage conditions governing access to the...
Magda Mourad, Jonathan Munson, Tamer Nadeem, Giova...