Sciweavers

374 search results - page 55 / 75
» Managing Delegation in Access Control Models
Sort
View
IEEEARES
2008
IEEE
14 years 1 months ago
Trust Modelling in E-Commerce through Fuzzy Cognitive Maps
Trust and its role in e-commerce is a major topic for researchers, clients, and service providers alike. However, questions of origin and practical usage of trust in e-commerce ar...
Christian Schläger, Günther Pernul
BTW
2007
Springer
245views Database» more  BTW 2007»
14 years 1 months ago
From Personal Desktops to Personal Dataspaces: A Report on Building the iMeMex Personal Dataspace Management System
Abstract: We propose a new system that is able to handle the entire Personal Dataspace of a user. A Personal Dataspace includes all data pertaining to a user on all his disks and o...
Jens-Peter Dittrich, Lukas Blunschi, Markus Fä...
IFIP
1993
Springer
13 years 11 months ago
Customization and Evolution of Process Models in EPOS
EPOS is a kernel software engineering environment, o ering integrated software con guration and process management. The EPOS process modeling PM support system runs on top of th...
Reidar Conradi, Maria Letizia Jaccheri
CCS
2008
ACM
13 years 9 months ago
A class of probabilistic models for role engineering
Role Engineering is a security-critical task for systems using role-based access control (RBAC). Different role-mining approaches have been proposed that attempt to automatically ...
Mario Frank, David A. Basin, Joachim M. Buhmann
DIMVA
2009
13 years 8 months ago
A Service Dependency Modeling Framework for Policy-Based Response Enforcement
The use of dynamic access control policies for threat response adapts local response decisions to high level system constraints. However, security policies are often carefully tigh...
Nizar Kheir, Hervé Debar, Fréd&eacut...