Sciweavers

374 search results - page 44 / 75
» Managing Delegation in Access Control Models
Sort
View
XSYM
2004
Springer
161views Database» more  XSYM 2004»
14 years 22 days ago
Adjustable Transaction Isolation in XML Database Management Systems
Processing XML documents in multi-user database management environments requires a suitable storage model of XML data, support of typical XML document processing (XDP) interfaces, ...
Michael Peter Haustein, Theo Härder
RBAC
1998
101views more  RBAC 1998»
13 years 8 months ago
An Oracle Implementation of the PRA97 Model for Permission-Role Assignment
In role-based access control RBAC permissions are associated with roles, and users are made members of appropriate roles thereby acquiring the roles' permissions. Using RBAC ...
Ravi S. Sandhu, Venkata Bhamidipati
SACMAT
2011
ACM
12 years 10 months ago
Modeling data flow in socio-information networks: a risk estimation approach
Information leakage via the networks formed by subjects (e.g., Facebook, Twitter) and objects (e.g., blogosphere) − some of whom may be controlled by malicious insiders − ofte...
Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling...
ISW
2009
Springer
14 years 1 months ago
Privacy-Aware Attribute-Based Encryption with User Accountability
As a new public key primitive, attribute-based encryption (ABE) is envisioned to be a promising tool for implementing fine-grained access control. To further address the concern o...
Jin Li, Kui Ren, Bo Zhu, Zhiguo Wan
CCS
2007
ACM
14 years 1 months ago
Managing RBAC states with transitive relations
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Chaoyi Pang, David P. Hansen, Anthony J. Maeder