Sciweavers

1627 search results - page 111 / 326
» On context in authorization policy
Sort
View
ACSAC
2002
IEEE
14 years 3 months ago
A Model for Attribute-Based User-Role Assignment
The Role-Based Access Control (RBAC) model is traditionally used to manually assign users to appropriate roles, based on a specific enterprise policy, thereby authorizing them to ...
Mohammad A. Al-Kahtani, Ravi S. Sandhu
CAISE
2000
Springer
14 years 3 months ago
CHAOS: An Active Security Mediation System
With the emergence of the Internet, collaborative computing has become more feasible than ever. Organizations can share valuable information among each other. However, certain user...
David Liu, Kincho H. Law, Gio Wiederhold
CSCW
2008
ACM
14 years 16 days ago
Mopping up: modeling wikipedia promotion decisions
This paper presents a model of the behavior of candidates for promotion to administrator status in Wikipedia. It uses a policy capture framework to highlight similarities and diff...
Moira Burke, Robert Kraut
ICPR
2002
IEEE
14 years 12 months ago
Hierarchical Monitoring of People's Behaviors in Complex Environments Using Multiple Cameras
We present a distributed, surveillance system that works in large and complex indoor environments. To track and recognize behaviors of people, we propose the use of the Hidden Mar...
Nam Thanh Nguyen, Svetha Venkatesh, Geoff A. W. We...
HPCC
2009
Springer
14 years 3 months ago
Evaluation of Coordinated Grid Scheduling Strategies
—Grid computing has emerged as a way to share geographically and organizationally distributed resources that may belong to different institutions or administrative domains. In th...
Ivan Rodero, Francesc Guim, Julita Corbalán