Sciweavers

216 search results - page 34 / 44
» Policy Analysis for Administrative Role Based Access Control
Sort
View
COLCOM
2007
IEEE
14 years 1 months ago
Towards trust-aware access management for ad-hoc collaborations
—In an ad-hoc collaborative sharing environment, attribute-based access control provides a promising approach in defining authorization over shared resources based on users’ p...
Jing Jin, Gail-Joon Ahn, Mohamed Shehab, Hongxin H...
ICDE
2008
IEEE
129views Database» more  ICDE 2008»
14 years 9 months ago
Optimal Boolean Matrix Decomposition: Application to Role Engineering
Abstract-- A decomposition of a binary matrix into two matrices gives a set of basis vectors and their appropriate combination to form the original matrix. Such decomposition solut...
Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri
CCS
2006
ACM
13 years 11 months ago
Safety analysis of usage control authorization models
The usage control (UCON) model was introduced as a unified approach to capture a number of extensions for traditional access control models. While the policy specification flexibi...
Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Pre...
CONCUR
2001
Springer
14 years 2 days ago
Reasoning about Security in Mobile Ambients
The paper gives an assessment of security for Mobile Ambients, with specific focus on mandatory access control (MAC) policies in multilevel security systems. The first part of th...
Michele Bugliesi, Giuseppe Castagna, Silvia Crafa
DGO
2000
91views Education» more  DGO 2000»
13 years 9 months ago
Simplifying data access: the energy data collection (EDC) project
The massive amount of statistical and text data available from government agencies has created a set of daunting challenges to both research and analysis communities. These proble...
José Luis Ambite, Yigal Arens, Luis Gravano...