Sciweavers

276 search results - page 5 / 56
» Role Organization Model in Hozo
Sort
View
SAC
2008
ACM
13 years 7 months ago
A cost-driven approach to role engineering
In recent years role-based access control (RBAC) has been spreading within organizations. However, companies still have considerable difficulty migrating to this model, due to the...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
TSMC
2008
81views more  TSMC 2008»
13 years 7 months ago
Role Transfer Problems and Algorithms
Role transfer is a usual activity in an organization, especially in a crisis situation. Role assignment and transfer regulations are important to accomplish it. This paper discusse...
Haibin Zhu, MengChu Zhou
SACMAT
2003
ACM
14 years 26 days ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
WER
2007
Springer
14 years 1 months ago
Role-Based Access Control Requirements Model with Purpose Extension
Role-Based Access Control (RBAC) is increasingly used for ensuring security and privacy in complex organizations such as healthcare institutions. In RBAC, access permissions are g...
Faranak Farzad, Eric Yu, Patrick C. K. Hung
FASE
2004
Springer
14 years 1 months ago
Modeling Role-Based Access Control Using Parameterized UML Models
Abstract. Organizations use Role-Based Access Control (RBAC) to protect computer-based resources from unauthorized access. There has been considerable work on formally specifying R...
Dae-Kyoo Kim, Indrakshi Ray, Robert B. France, Na ...