Sciweavers

3712 search results - page 199 / 743
» Role-Based Access Control
Sort
View
ESORICS
2007
Springer
15 years 8 months ago
What, Indeed, Is Intransitive Noninterference?
Abstract. This paper argues that Haigh and Young’s definition of noninterference for intransitive security policies admits information flows that are not in accordance with the...
Ron van der Meyden
102
Voted
DBSEC
2010
137views Database» more  DBSEC 2010»
15 years 4 months ago
Constructing Key Assignment Schemes from Chain Partitions
Abstract. In considering a problem in access control for scalable multimedia formats, we have developed new methods for constructing a key assignment scheme. Our first contribution...
Jason Crampton, Rosli Daud, Keith M. Martin
117
Voted
CSCWD
2008
Springer
15 years 4 months ago
Authorization approaches for advanced permission-role assignments
Role-based access control (RBAC) has been proven to be a flexible and useful access control model for information sharing in distributed collaborative environments. Permission-rol...
Hua Wang, Jianming Yong, Jiuyong Li, Min Peng
DBSEC
2006
115views Database» more  DBSEC 2006»
15 years 4 months ago
Creating Objects in the Flexible Authorization Framework
Access control is a crucial concern to build secure IT systems and, more specifically, to protect the confidentiality of information. However, access control is necessary, but not ...
Nicola Zannone, Sushil Jajodia, Duminda Wijesekera
129
Voted
DMKD
2003
ACM
108views Data Mining» more  DMKD 2003»
15 years 7 months ago
Dynamic inference control
An inference problem exists in a multilevel database if knowledge of some objects in the database allows information with a higher security level to be inferred. Many such inferen...
Jessica Staddon