Sciweavers

3712 search results - page 124 / 743
» Role-Based Access Control
Sort
View
TRUSTBUS
2010
Springer
13 years 7 months ago
Extending XACML Access Control Architecture for Allowing Preference-Based Authorisation
: European data protection regulation states that organisations must have data subjects’ consent to use their personally identifiable information (PII) for a variety of purposes....
Gina Kounga, Marco Casassa Mont, Pete Bramhall
HASE
2007
IEEE
14 years 3 months ago
Flexible Authorization with Decentralized Access Control Model for Grid Computing
Xinwen Zhang, Qi Li, Jean-Pierre Seifert, Mingwei ...
SACMAT
2004
ACM
14 years 2 months ago
Using uml to visualize role-based access control constraints
Indrakshi Ray, Na Li, Robert B. France, Dae-Kyoo K...
ICSE
2007
IEEE-ACM
14 years 9 months ago
Ownership and Immutability Inference for UML-Based Object Access Control
We propose a mechanism for object access control which is based on the UML. Specifically, we propose use of ownership and immutability constraints on UML associations and verifica...
Yin Liu, Ana Milanova
IEEEIAS
2009
IEEE
14 years 3 months ago
Secure Access Control Scheme of RFID System Application
-- Radio Frequency Identification (RFID) is a contactless technology, it is considered the way to replace the barcode, since the barcode data is read with line of sight and limits ...
Yu-Chih Huang