Sciweavers

3712 search results - page 21 / 743
» Role-Based Access Control
Sort
View
SASO
2008
IEEE
14 years 1 months ago
Flexible Hierarchical Organisation of Role Based Agents
Emmanuel Adam, Emmanuelle Grislin-Le Strugeon, Ren...
ICECCS
2005
IEEE
108views Hardware» more  ICECCS 2005»
14 years 1 months ago
Evolving Messaging Systems for Secure Role Based Messaging
This paper articulates a system design for the secure role based messaging model built based on existing messaging systems, public key infrastructures, and a privilege management ...
Gansen Zhao, David W. Chadwick
AINA
2006
IEEE
14 years 1 months ago
Distributed Key Management for Secure Role based Messaging
Secure Role Based Messaging (SRBM) augments messaging systems with role oriented communication in a secure manner. Role occupants can sign and decrypt messages on behalf of roles....
Gansen Zhao, Sassa Otenko, David W. Chadwick
ACSAC
2002
IEEE
14 years 15 days ago
Access Control for Active Spaces
Active Spaces are physical spaces augmented with heterogeneous computing and communication devices along with supporting software infrastructure. This integration facilitates coll...
Geetanjali Sampemane, Prasad Naldurg, Roy H. Campb...
ACSAC
2008
IEEE
14 years 2 months ago
The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies
Role hierarchies are fundamental to the role based access control (RBAC) model. The notion of role hierarchy is a well understood concept that allows senior roles to inherit the p...
Qi Guo, Jaideep Vaidya, Vijayalakshmi Atluri