Sciweavers

715 search results - page 10 / 143
» Integration of Access Control in Information Systems: From R...
Sort
View
RBAC
1998
101views more  RBAC 1998»
13 years 8 months ago
An Oracle Implementation of the PRA97 Model for Permission-Role Assignment
In role-based access control RBAC permissions are associated with roles, and users are made members of appropriate roles thereby acquiring the roles' permissions. Using RBAC ...
Ravi S. Sandhu, Venkata Bhamidipati
ICSE
2007
IEEE-ACM
14 years 7 months ago
When Role Models Have Flaws: Static Validation of Enterprise Security Policies
Modern multiuser software systems have adopted RoleBased Access Control (RBAC) for authorization management. This paper presents a formal model for RBAC policy validation and a st...
Marco Pistoia, Stephen J. Fink, Robert J. Flynn, E...
DESRIST
2009
Springer
137views Education» more  DESRIST 2009»
14 years 10 hour ago
Situational method engineering for governance, risk and compliance information systems
Against the background of the current financial crisis and an aftermath of increasing regulation, companies enhance and integrate information systems in the areas of risk manageme...
Anke Gericke, Hans-Georg Fill, Dimitris Karagianni...
CDC
2010
IEEE
137views Control Systems» more  CDC 2010»
13 years 2 months ago
Control of large 1D networks of double integrator agents: Role of heterogeneity and asymmetry on stability margin
We consider the distributed control of a network of heterogeneous agents with double integrator dynamics to maintain a rigid formation in 1D. The control signal at a vehicle is all...
He Hao, Prabir Barooah
SACMAT
2003
ACM
14 years 19 days ago
The role control center: features and case studies
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...