Sciweavers

198 search results - page 4 / 40
» Security Property Based Administrative Controls
Sort
View
CCS
2004
ACM
14 years 23 days ago
Comparing the expressive power of access control models
Comparing the expressive power of access control models is recognized as a fundamental problem in computer security. Such comparisons are generally based on simulations between di...
Mahesh V. Tripunitara, Ninghui Li
RBAC
1998
84views more  RBAC 1998»
13 years 8 months ago
Decentralized User-role Assignment for Web-based Intranets
The intricacy of security administration is one of the most challenging problems in large networked systems. This problem is especially serious in the Web environment, which consi...
Ravi S. Sandhu, Joon S. Park
DBSEC
2006
122views Database» more  DBSEC 2006»
13 years 8 months ago
Term Rewriting for Access Control
We demonstrate how access control models and policies can be represented by using term rewriting systems, and how rewriting may be used for evaluating access requests and for provi...
Steve Barker, Maribel Fernández
SWS
2006
ACM
14 years 1 months ago
A comprehensive security architecture for dynamic, web service based virtual organizations for businesses
In this paper we propose a security architecture for Virtual Organizations for businesses. The Virtual Organizations we consider are based on web service technology to address int...
Rafael Deitos, Florian Kerschbaum, Philip Robinson
SERP
2010
13 years 5 months ago
Role Explosion: Acknowledging the Problem
- In large enterprises subject to constant employee turnover and challenging security policies, the administration of Role-based Access Control (RBAC) is a daunting task that is of...
Aaron Elliott, Scott Knight