Sciweavers

1627 search results - page 127 / 326
» On context in authorization policy
Sort
View
JAT
2008
100views more  JAT 2008»
13 years 10 months ago
Direct and inverse results in variable Hilbert scales
Variable Hilbert scales are an important tool for the recent analysis of inverse problems in Hilbert spaces, as these constitute a way to describe smoothness of objects other than ...
Peter Mathé, Bernd Hofmann
WWW
2009
ACM
14 years 11 months ago
QuWi: quality control in Wikipedia
We propose and evaluate QuWi (Quality in Wikipedia), a framework for quality control in Wikipedia. We build upon a previous proposal by Mizzaro [11], who proposed a method for sub...
Alberto Cusinato, Vincenzo Della Mea, Francesco Di...
SACMAT
2003
ACM
14 years 3 months ago
Induced role hierarchies with attribute-based RBAC
The Role-Based Access Control (RBAC) model is traditionally used to manually assign users to appropriate roles. When the service-providing enterprise has a massive customer base, ...
Mohammad A. Al-Kahtani, Ravi S. Sandhu
SACMAT
2003
ACM
14 years 3 months ago
PBDM: a flexible delegation model in RBAC
Role-based access control (RBAC) is recognized as an efficient access control model for large organizations. Most organizations have some business rules related to access control...
Xinwen Zhang, Sejong Oh, Ravi S. Sandhu
USENIX
2003
13 years 11 months ago
Secure and Flexible Global File Sharing
Trust management credentials directly authorize actions, rather than divide the authorization task into authentication and access control. Unlike traditional credentials, which bi...
Stefan Miltchev, Vassilis Prevelakis, Sotiris Ioan...