Sciweavers

3712 search results - page 58 / 743
» Role-Based Access Control
Sort
View
ICWS
2010
IEEE
13 years 9 months ago
Checking Compatibility and Replaceability in Web Services Business Protocols with Access Control
Recently, describing behavior of web services is becoming more and more important. This behavior can be described by business protocols representing the possible sequences of messa...
Emad Elabd, Emmanuel Coquery, Mohand-Said Hacid
CSCW
2002
ACM
13 years 7 months ago
A new dimension in access control: studying maintenance engineering across organizational boundaries
Inter-organizational cooperation has specific requirements for access control. The paper presents the results from a field study which looks at the cooperation between two enginee...
Gunnar Stevens, Volker Wulf
CSREASAM
2010
13 years 5 months ago
A Hacking View of Access Control
The importance of computer security in order to maintain the confidentiality, integrity and availability of data and information is well known. Different mechanisms have been propo...
Pedro Diaz-Gomez, Gregory Steen
ICDE
1996
IEEE
178views Database» more  ICDE 1996»
14 years 9 months ago
Authorization and Access Control in IRO-DB
A. Min Tjoa, Fritz Kastner, Günther Pernul, S...
ICPP
2005
IEEE
14 years 1 months ago
Distributed Access Control in CROWN Groups
Security in collaborative groups is an active research topic and has been recognized by many organizations in the past few years. In this paper, we propose a fine-grained and attr...
Jinpeng Huai, Yu Zhang, Xianxian Li, Yunhao Liu