Sciweavers

769 search results - page 21 / 154
» Policy Storage for Role-Based Access Control Systems
Sort
View
ESORICS
2008
Springer
13 years 10 months ago
Compositional Refinement of Policies in UML - Exemplified for Access Control
The UML is the de facto standard for system specification, but offers little specialized support for the specification and analysis of policies. This paper presents Deontic STAIRS,...
Bjørnar Solhaug, Ketil Stølen
JCS
2008
88views more  JCS 2008»
13 years 8 months ago
A privacy-aware access control system
The protection of privacy is an increasing concern in our networked society because of the growing amount of personal information that is being collected by a number of commercial...
Claudio Agostino Ardagna, Marco Cremonini, Sabrina...
COMPSAC
2007
IEEE
14 years 22 days ago
Conformance Checking of Access Control Policies Specified in XACML
Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to whi...
Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie
RBAC
1998
84views more  RBAC 1998»
13 years 10 months ago
Decentralized User-role Assignment for Web-based Intranets
The intricacy of security administration is one of the most challenging problems in large networked systems. This problem is especially serious in the Web environment, which consi...
Ravi S. Sandhu, Joon S. Park
ICDE
2003
IEEE
162views Database» more  ICDE 2003»
14 years 10 months ago
Dynamic Access Control Framework Based On Events
Access Control policies in e-commerce domain can be quite complex, affecting the response time provided to the users. We describe an event-based access control system that can pot...
Manish Bhide, Sandeep Pandey, Ajay Gupta 0004, Muk...