Sciweavers

374 search results - page 9 / 75
» Managing Delegation in Access Control Models
Sort
View
RBAC
1998
85views more  RBAC 1998»
13 years 8 months ago
Control Principles and Role Hierarchies
Role-based access control (RBAC) has been introduced in the last few years, and offers a powerful means of specifying access control decisions. The model of RBAC usually assumes t...
Jonathan D. Moffett
SOUPS
2006
ACM
14 years 1 months ago
Intentional access management: making access control usable for end-users
The usability of access control mechanisms in modern distributed systems has been widely criticized but little studied. In this paper, we carefully examine one such widely deploye...
Xiang Cao, Lee Iverson
CODASPY
2011
12 years 11 months ago
Relationship-based access control: protection model and policy language
Social Network Systems pioneer a paradigm of access control that is distinct from traditional approaches to access control. Gates coined the term Relationship-Based Access Control...
Philip W. L. Fong
DEXAW
1998
IEEE
160views Database» more  DEXAW 1998»
13 years 11 months ago
Coordination in Message-Based Environments: Restructuring Internet E-Mail to Accomplish Tasks
In this paper we consider e-mail as a task management tool. Our general goal is to restructure the domain of e-mail. The purpose is to make e-mail even more suitable for messageba...
Juha Takkinen, Nahid Shahmehri
RAID
2004
Springer
14 years 22 days ago
RheoStat: Real-Time Risk Management
As the frequency of attacks faced by the average host connected to the Internet increases, reliance on manual intervention for response is decreasingly tenable. Operating system an...
Ashish Gehani, Gershon Kedem