Sciweavers

352 search results - page 17 / 71
» Role-based Access Control on the Web Using LDAP
Sort
View
ICWS
2010
IEEE
13 years 10 months ago
Checking Compatibility and Replaceability in Web Services Business Protocols with Access Control
Recently, describing behavior of web services is becoming more and more important. This behavior can be described by business protocols representing the possible sequences of messa...
Emad Elabd, Emmanuel Coquery, Mohand-Said Hacid
CSFW
2012
IEEE
11 years 11 months ago
Gran: Model Checking Grsecurity RBAC Policies
—Role-based Access Control (RBAC) is one of the most widespread security mechanisms in use today. Given the growing complexity of policy languages and access control systems, ver...
Michele Bugliesi, Stefano Calzavara, Riccardo Foca...
CCS
2004
ACM
14 years 2 months ago
Comparing the expressive power of access control models
Comparing the expressive power of access control models is recognized as a fundamental problem in computer security. Such comparisons are generally based on simulations between di...
Mahesh V. Tripunitara, Ninghui Li
VLDB
2008
ACM
148views Database» more  VLDB 2008»
14 years 9 months ago
Purpose based access control for privacy protection in relational database systems
Abstract In this article, we present a comprehensive approach for privacy preserving access control based on the notion of purpose. In our model, purpose information associated wit...
Ji-Won Byun, Ninghui Li
HICSS
2009
IEEE
97views Biometrics» more  HICSS 2009»
14 years 3 months ago
Selecting Web Services and Participants for Enforcing Workflow Access Control
Web services have emerged as a de facto standard for encapsulating services within or across organization boundaries. Various proposals have been made to compose Web services into...
San-Yih Hwang, Chuan Yin, Chien-Hsiang Lee