Sciweavers

215 search results - page 27 / 43
» Role Based Access Control for UDDI Inquiries
Sort
View
SP
2007
IEEE
183views Security Privacy» more  SP 2007»
15 years 10 months ago
Ciphertext-Policy Attribute-Based Encryption
In several distributed systems a user should only be able to access data if a user posses a certain set of credentials or attributes. Currently, the only method for enforcing such...
John Bethencourt, Amit Sahai, Brent Waters
143
Voted
ATAL
2005
Springer
15 years 9 months ago
An organisation infrastructure for Multi-Agent Systems based on Agent Coordination Contexts
We present an organisation infrastructure for open MultiAgent Systems built upon a role-based access control model (RBAC), which provides agents with means to enable and control a...
Mirko Viroli, Alessandro Ricci, Andrea Omicini
134
Voted
CSSE
2004
IEEE
15 years 3 months ago
AdOrBAC: an administration model for Or-BAC
Even though the final objective of an access control model is to provide a framework to decide if actions performed by subjects on objects are permitted or not, it is not convenie...
Frédéric Cuppens, Alexandre Mi&egrav...
143
Voted
CCS
2004
ACM
15 years 9 months ago
Comparing the expressive power of access control models
Comparing the expressive power of access control models is recognized as a fundamental problem in computer security. Such comparisons are generally based on simulations between di...
Mahesh V. Tripunitara, Ninghui Li
136
Voted
SACMAT
2009
ACM
15 years 10 months ago
Ensuring spatio-temporal access control for real-world applications
Traditional access control models, such as Role-Based Access Control (RBAC), do not take into account contextual information, such as location and time, for making access decision...
Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anas...