Sciweavers

3712 search results - page 18 / 743
» Role-Based Access Control
Sort
View
EUROPKI
2005
Springer
14 years 1 months ago
Development of a Flexible PERMIS Authorisation Module for Shibboleth and Apache Server
This paper describes the development of a flexible Role Based Access Control (RBAC) authorisation module – the Shibboleth and Apache Authorisation Module (SAAM) which is based on...
Wensheng Xu, David W. Chadwick, Sassa Otenko
SACMAT
2003
ACM
14 years 23 days ago
Induced role hierarchies with attribute-based RBAC
The Role-Based Access Control (RBAC) model is traditionally used to manually assign users to appropriate roles. When the service-providing enterprise has a massive customer base, ...
Mohammad A. Al-Kahtani, Ravi S. Sandhu
ACISP
2003
Springer
14 years 23 days ago
A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems
Abstract. This paper examines the access control requirements of distributed health care information networks. Since the electronic sharing of an individual’s personal health inf...
Jason Reid, Ian Cheong, Matthew Henricksen, Jason ...
ICCS
2001
Springer
13 years 12 months ago
The Policy Machine for Security Policy Management
Abstract. Many different access control policies and models have been developed to suit a variety of goals; these include Role-Based Access Control, One-directional Information Flo...
Vincent C. Hu, Deborah A. Frincke, David F. Ferrai...
CCS
2004
ACM
14 years 28 days ago
Comparing the expressive power of access control models
Comparing the expressive power of access control models is recognized as a fundamental problem in computer security. Such comparisons are generally based on simulations between di...
Mahesh V. Tripunitara, Ninghui Li