Sciweavers

860 search results - page 17 / 172
» On the Security of Delegation in Access Control Systems
Sort
View
ISW
2004
Springer
14 years 27 days ago
Model-Checking Access Control Policies
We present a model of access control which provides fine-grained data-dependent control, can express permissions about permissions, can express delegation, and can describe syste...
Dimitar P. Guelev, Mark Ryan, Pierre-Yves Schobben...
ACSAC
2005
IEEE
14 years 1 months ago
Paranoid: A Global Secure File Access Control System
The Paranoid file system is an encrypted, secure, global file system with user managed access control. The system provides efficient peer-to-peer application transparent file ...
Fareed Zaffar, Gershon Kedem, Ashish Gehani
IEEEIAS
2009
IEEE
14 years 2 months ago
Secure Access Control Scheme of RFID System Application
-- Radio Frequency Identification (RFID) is a contactless technology, it is considered the way to replace the barcode, since the barcode data is read with line of sight and limits ...
Yu-Chih Huang
SACMAT
2004
ACM
14 years 29 days ago
Security analysis in role-based access control
Ninghui Li, Mahesh V. Tripunitara