Sciweavers

3712 search results - page 34 / 743
» Role-Based Access Control
Sort
View
COMPSAC
2006
IEEE
14 years 1 months ago
A Pattern-Based Technique for Developing UML Models of Access Control Systems
This paper describes a pattern-based technique for systematic development of UML models of secure systems using access control. Access control is viewed and specified as a design...
Dae-Kyoo Kim, Priya Gokhale
DNIS
2005
Springer
89views Database» more  DNIS 2005»
14 years 1 months ago
Policies, Models, and Languages for Access Control
Access control is the process of mediating every request to data and services maintained by a system and determining whether the request should be granted or denied. Expressiveness...
Sabrina De Capitani di Vimercati, Pierangela Samar...
GCC
2004
Springer
14 years 1 months ago
A Novel VO-Based Access Control Model for Grid
As an important aspect of grid security, access control model gets more and more attention. Entities in virtual organizations (VOs) must establish a dynamic, secure and cooperative...
Weizhong Qiang, Hai Jin, Xuanhua Shi, Deqing Zou
CBMS
2006
IEEE
14 years 1 months ago
How to Break Access Control in a Controlled Manner
The Electronic Medical Record (EMR) integrates heterogeneous information within a Healthcare Institution stressing the need for security and access control. The Biostatistics and ...
Ana Ferreira, Ricardo João Cruz Correia, Lu...
INFOCOM
2005
IEEE
14 years 1 months ago
Joint congestion control and media access control design for ad hoc wireless networks
Abstract— We present a model for the joint design of congestion control and media access control (MAC) for ad hoc wireless networks. Using contention graph and contention matrix,...
Lijun Chen, Steven H. Low, John C. Doyle