Sciweavers

860 search results - page 42 / 172
» On the Security of Delegation in Access Control Systems
Sort
View
IEEEARES
2006
IEEE
14 years 2 months ago
Supporting Attribute-based Access Control with Ontologies
In highly open systems like the Internet, attribute-based access control (ABAC) has proven its appropriateness. The specification and maintenance of ABAC policies however has tur...
Torsten Priebe, Wolfgang Dobmeier, Nora Kamprath
DBSEC
2010
152views Database» more  DBSEC 2010»
13 years 10 months ago
Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems
Abstract. We present a modelling language, called X-Policy, for webbased collaborative systems with dynamic access control policies. The access to resources in these systems depend...
Hasan Qunoo, Mark Ryan
ACSAC
2000
IEEE
14 years 11 days ago
Dynamic Access Control through Petri Net Workflows
Access control is an important protection mechanism for information systems. An access control matrix grants subjects privileges to objects. Today, access control matrices are sta...
Konstantin Knorr
SWS
2004
ACM
14 years 2 months ago
Applying hierarchical and role-based access control to XML documents
W3C Recommendations XML Encryption and XML-Digital Signature can be used to protect the confidentiality of and provide assurances about the integrity of XML documents transmitted...
Jason Crampton
CSFW
2006
IEEE
14 years 2 months ago
Secrecy by Typing and File-Access Control
Secrecy properties can be guaranteed through a combination of static and dynamic checks. The static checks may include the application of special type systems with notions of secr...
Avik Chaudhuri, Martín Abadi