Sciweavers

860 search results - page 47 / 172
» On the Security of Delegation in Access Control Systems
Sort
View
ACSAC
2001
IEEE
14 years 13 days ago
Security Policy Enforcement at the File System Level in the Windows NT Operating System Family
This paper describes the implementation of an enforcement module for file system security implemented as part of a security architecture for distributed systems which enforces a c...
Stephen D. Wolthusen
CLADE
2003
IEEE
14 years 2 months ago
G-Monitor: A Web Portal for Monitoring and Steering Application Execution on Global Grids
As Grids are emerging as the next-generation computing platform, the need for Web-based portals that hide low level details of accessing Grid services for deployment and execution ...
Martin Placek, Rajkumar Buyya
CCS
2007
ACM
14 years 23 days ago
Efficient techniques for realizing geo-spatial access control
The problem of key management for access control systems has been well-studied, and the literature contains several schemes for hierarchy-based and temporal-based access control. ...
Mikhail J. Atallah, Marina Blanton, Keith B. Frikk...
INFORMATICALT
2008
115views more  INFORMATICALT 2008»
13 years 8 months ago
A Fine-Grained Access Control System Combining MAC and RBACK Models for XML
In this paper, we present a novel fine-grained access control system for applications where the information flow is critical; the confidentiality of the data is essential and there...
Mustafa M. Kocatürk, Taflan I. Gündem
WETICE
1997
IEEE
14 years 29 days ago
How Role Based Access Control is Implemented in SESAME
In this paper we want to share our experiences with implementing a scheme that enforces role based access control in a distributed, heterogeneous computing environment. This work ...
Mark Vandenwauver, René Govaerts, Joos Vand...