Sciweavers

128 search results - page 11 / 26
» Role Based Access Control for the Interaction with Search En...
Sort
View
SBBD
2004
150views Database» more  SBBD 2004»
13 years 9 months ago
Active XML, Security and Access Control
XML and Web services are revolutioning the automatic management of distributed information, somewhat in the same way that HTML, Web browsers and search engines modified human acce...
Serge Abiteboul, Omar Benjelloun, Bogdan Cautis, T...
CCS
2008
ACM
13 years 9 months ago
Towards automatic reverse engineering of software security configurations
The specifications of an application's security configuration are crucial for understanding its security policies, which can be very helpful in security-related contexts such...
Rui Wang 0010, XiaoFeng Wang, Kehuan Zhang, Zhuowe...
EUROPAR
2000
Springer
13 years 11 months ago
An Architecture for Web-Based Interaction and Steering of Adaptive Parallel/Distributed Applications
This paper presents an architecture for web-based interaction and steering of parallel/distributed scientific applications. The architecture is composed of detachable thin-clients ...
Rajeev Muralidhar, Samian Kaur, Manish Parashar
ACSAC
2002
IEEE
14 years 15 days ago
Access Control for Active Spaces
Active Spaces are physical spaces augmented with heterogeneous computing and communication devices along with supporting software infrastructure. This integration facilitates coll...
Geetanjali Sampemane, Prasad Naldurg, Roy H. Campb...
COMPSEC
2010
122views more  COMPSEC 2010»
13 years 5 months ago
Taming role mining complexity in RBAC
In this paper we address the problem of reducing the role mining complexity in RBAC systems. To this aim, we propose a three steps methodology: first, we associate a weight to rol...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...