Sciweavers

860 search results - page 25 / 172
» On the Security of Delegation in Access Control Systems
Sort
View
ASWC
2006
Springer
13 years 10 months ago
A Semantic Search Conceptual Model and Application in Security Access Control
Abstract. We propose a conceptual model for semantic search and implement it in security access control. The model provides security access control to extend the search capabilitie...
Kunmei Wen, Zhengding Lu, Ruixuan Li, Xiaolin Sun,...
MMMACNS
2001
Springer
14 years 1 months ago
Future Directions in Role-Based Access Control Models
Abstract. In the past five years there has been tremendous activity in rolebased access control (RBAC) models. Consensus has been achieved on a standard core RBAC model that is in ...
Ravi S. Sandhu
COMGEO
2010
ACM
14 years 1 days ago
Access control systems for spatial data infrastructures and their administration
Today sophisticated concepts, languages and frameworks exist, that allow implementing powerful fine grained access control systems for protecting Web Services and spatial data in ...
Jan Herrmann
SOUPS
2006
ACM
14 years 2 months ago
Intentional access management: making access control usable for end-users
The usability of access control mechanisms in modern distributed systems has been widely criticized but little studied. In this paper, we carefully examine one such widely deploye...
Xiang Cao, Lee Iverson
STORAGESS
2006
ACM
14 years 2 months ago
Access control for a replica management database
Distributed computation systems have become an important tool for scientific simulation, and a similarly distributed replica management system may be employed to increase the loc...
Justin M. Wozniak, Paul Brenner, Douglas Thain