In this paper we want to share our experiences with implementing a scheme that enforces role based access control in a distributed, heterogeneous computing environment. This work ...
Web Services technology enables organisations to exploit software as a service. Services are accessed by method invocations. Method interfaces are described and published, and may...
Making correct access-control decisions is central to security, which in turn requires accounting correctly for the identity, credentials, roles, authority, and privileges of users...
Thumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Ch...
—We propose an access control model that extends RBAC (Role-Based Access Control) to take time and location into account, and use term rewriting systems to specify access control...
How to structure diverse (documentation) information sources of an enterprise and how to arrange a workflow with access control are two important issues for online authoring and p...
Zhongdong Zhang, Ernst Georg Haffner, Andreas Heue...