Sciweavers

215 search results - page 17 / 43
» Role Based Access Control for UDDI Inquiries
Sort
View
SACMAT
2003
ACM
14 years 1 months ago
Dependencies and separation of duty constraints in GTRBAC
A Generalized Temporal Role Based Access Control (GTRBAC) model that captures an exhaustive set of temporal constraint needs for access control has recently been proposed. GTRBACā...
James Joshi, Basit Shafiq, Arif Ghafoor, Elisa Ber...
VLDB
2008
ACM
148views Database» more  VLDB 2008»
14 years 8 months ago
Purpose based access control for privacy protection in relational database systems
Abstract In this article, we present a comprehensive approach for privacy preserving access control based on the notion of purpose. In our model, purpose information associated wit...
Ji-Won Byun, Ninghui Li
ACSAC
2002
IEEE
14 years 27 days ago
A Model for Attribute-Based User-Role Assignment
The Role-Based Access Control (RBAC) model is traditionally used to manually assign users to appropriate roles, based on a specific enterprise policy, thereby authorizing them to ...
Mohammad A. Al-Kahtani, Ravi S. Sandhu
COLCOM
2008
IEEE
14 years 2 months ago
A Constraint and Attribute Based Security Framework for Dynamic Role Assignment in Collaborative Environments
Abstract. We investigate a security framework for collaborative applications that relies on the role-based access control (RBAC) model. In our framework, roles are pre-deļ¬ned and...
Isabel F. Cruz, Rigel Gjomemo, Benjamin Lin, Mirko...
ACSAC
2001
IEEE
13 years 11 months ago
Detecting Conflicts in a Role-Based Delegation Model
The RBAC96 access control model has been the basis for extensive work on role-based constraint specification and role-based delegation. However, these practical extensions can als...
Andreas Schaad