Sciweavers

352 search results - page 12 / 71
» Role-based Access Control on the Web Using LDAP
Sort
View
IKE
2003
13 years 10 months ago
Access Control System Using Web Services for XML Messaging Systems
We describe the design of an Access Control System using Web Services for information and content management. In this paper we described the solution for control mechanism of the ...
Ali Kaplan, Ahmet E. Topcu, Marlon E. Pierce, Geof...
ACISP
2003
Springer
14 years 2 months ago
A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems
Abstract. This paper examines the access control requirements of distributed health care information networks. Since the electronic sharing of an individual’s personal health inf...
Jason Reid, Ian Cheong, Matthew Henricksen, Jason ...
INTR
2007
100views more  INTR 2007»
13 years 8 months ago
Web services access control architecture incorporating trust
Purpose – This paper seeks to investigate how the concept of a trust level is used in the access control policy of a web services provider in conjunction with the attributes of ...
Marijke Coetzee, Jan H. P. Eloff
ENTCS
2006
140views more  ENTCS 2006»
13 years 8 months ago
A Web Service Architecture for Enforcing Access Control Policies
Web services represent a challenge and an opportunity for organizations wishing to expose product and services offerings through the Internet. The Web service technology provides ...
Claudio Agostino Ardagna, Ernesto Damiani, Sabrina...
SACMAT
2010
ACM
14 years 1 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam