Sciweavers

393 search results - page 22 / 79
» Implementing Role Based Access Control for Federated Informa...
Sort
View
SACMAT
2011
ACM
12 years 10 months ago
xDAuth: a scalable and lightweight framework for cross domain access control and delegation
Cross domain resource sharing and collaborations have become pervasive in today’s service oriented organizations. Existing approaches for the realization of cross domain access ...
Masoom Alam, Xinwen Zhang, Kamran Khan, Gohar Ali
NDSS
2003
IEEE
14 years 20 days ago
Access Control Based on Execution History
Security is a major, frequent concern in extensible software systems such as Java Virtual Machines and the Common Language Runtime. These systems aim to enable simple, classic app...
Martín Abadi, Cédric Fournet
FAST
2009
13 years 5 months ago
Scalable Access Controls for Lineage
Lineage stores often contain sensitive information that needs protection from unauthorized access. We build on prior work for security and privacy of lineage information, focusing...
Arnon Rosenthal, Len Seligman, Adriane Chapman, Ba...
HICSS
2003
IEEE
107views Biometrics» more  HICSS 2003»
14 years 21 days ago
Heritage and the Role of Data Management Systems: A Prototype Model for New Zealand
Heritage management in New Zealand is data rich but information poor. For nearly 50 years, the New Zealand Archaeological Association has maintained a paper based, largely textual...
Lesley A. Gardner, S. J. Holdaway, D. C. Whitehead...
LOCA
2009
Springer
14 years 1 months ago
LOCK: A Highly Accurate, Easy-to-Use Location-Based Access Control System
With proliferation of ubiquitous computing, digital access is facing an increasing risk since unauthorized client located at any place may intrude a local server. Location Based Ac...
Yongcai Wang, Junhui Zhao, Toshikazu Fukushima