Sciweavers

352 search results - page 22 / 71
» Role-based Access Control on the Web Using LDAP
Sort
View
EAGC
2003
Springer
14 years 1 months ago
Mobile Work Environment for Grid Users
In the paper we aim to describe the project developing the Migrating Desktop infrastructure for the mobile users in a simple way. We also focus on the development testbed, which i...
Miroslaw Kupczyk, Rafal Lichwala, Norbert Meyer, B...
ICDCIT
2004
Springer
14 years 2 months ago
Using Schemas to Simplify Access Control for XML Documents
Abstract. Organizations are increasingly using the the eXtensible Markup Language (XML) for document representation and exchange on the Web. To protect an XML document from unautho...
Indrakshi Ray, Marianna Muller
ICDCSW
2003
IEEE
14 years 2 months ago
Using Service Brokers for Accessing Backend Servers for Web Applications
— Current Web servers use various API sets to access backend services. This model does not support service differentiation, overload control, caching of contents generated by bac...
Huamin Chen, Prasant Mohapatra
ICCS
2009
Springer
14 years 3 months ago
Access Policy Design Supported by FCA Methods
Role Based Access Control (RBAC) is a methodology for providing users in an IT system specific permissions like write or read to t abstracts from specific users and binds permiss...
Frithjof Dau, Martin Knechtel
WETICE
2008
IEEE
14 years 3 months ago
On the Modeling of Bell-LaPadula Security Policies Using RBAC
The Bell-LaPadula security model is a hybrid model that combines mandatory access controls and discretionary access controls. The Bell-LaPadula security model has been widely acce...
Gansen Zhao, David W. Chadwick