Sciweavers

3712 search results - page 60 / 743
» Role-Based Access Control
Sort
View
LISP
2008
97views more  LISP 2008»
13 years 7 months ago
Efficient and flexible access control via Jones-optimal logic program specialisation
We describe the use of a flexible meta-interpreter for performing access control checks on deductive databases. The meta-program is implemented in Prolog and takes as input a datab...
Steve Barker, Michael Leuschel, Mauricio Varea
SIGMOD
2006
ACM
124views Database» more  SIGMOD 2006»
14 years 7 months ago
Redundancy and information leakage in fine-grained access control
The current SQL standard for access control is coarse grained, in that it grants access to all rows of a table or none. Fine-grained access control, which allows control of access...
Govind Kabra, Ravishankar Ramamurthy, S. Sudarshan
ESORICS
2008
Springer
13 years 9 months ago
On the Security of Delegation in Access Control Systems
Delegation is a mechanism that allows a user A to act on another user B's behalf by making B's access rights available to A. It is well recognized as an important mechani...
Qihua Wang, Ninghui Li, Hong Chen
JIIS
2002
118views more  JIIS 2002»
13 years 7 months ago
Authorization and Access Control of Application Data in Workflow Systems
: Workflow Management Systems (WfMSs) are used to support the modeling and coordinated execution of business processes within an organization or across organizational boundaries. A...
Shengli Wu, Amit P. Sheth, John A. Miller, Zongwei...
SACMAT
2005
ACM
14 years 1 months ago
Relevancy based access control of versioned XML documents
Integration of version and access control of XML documents has the benefit of regulating access to rapidly growing archives of XML documents. Versioned XML documents provide us w...
Mizuho Iwaihara, Somchai Chatvichienchai, Chutipor...