Sciweavers

269 search results - page 12 / 54
» Security analysis in role-based access control
Sort
View
144
Voted
MOBIQUITOUS
2005
IEEE
15 years 9 months ago
A SIP-based Architecture model for Contextual Coalition Access Control for Ubiquitous Computing
A significant deterrent to the ability to connect in a spontaneous manner in cross-enterprise collaborative applications is the difficulty in users from different domains being ab...
Ramiro Liscano, Kaining Wang
125
Voted
ASWC
2006
Springer
15 years 5 months ago
A Semantic Search Conceptual Model and Application in Security Access Control
Abstract. We propose a conceptual model for semantic search and implement it in security access control. The model provides security access control to extend the search capabilitie...
Kunmei Wen, Zhengding Lu, Ruixuan Li, Xiaolin Sun,...
138
Voted
SACMAT
2003
ACM
15 years 8 months ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
94
Voted
CCS
2003
ACM
15 years 8 months ago
XML access control using static analysis
Makoto Murata, Akihiko Tozawa, Michiharu Kudo, Sat...