Sciweavers

1641 search results - page 8 / 329
» Subject Composition by Roles
Sort
View
SACMAT
2004
ACM
14 years 24 days ago
On the role of roles: from role-based to role-sensitive access control
This paper maintains that for an access-control mechanism to support a wide range of policies, it is best to dispense with any built-in semantics for roles in the mechanism itself...
Xuhui Ao, Naftaly H. Minsky
SIBGRAPI
2007
IEEE
14 years 1 months ago
White blood cell segmentation using morphological operators and scale-space analysis
Cell segmentation is a challenging problem due to both the complex nature of the cells and the uncertainty present in video microscopy. Manual methods for this purpose are onerous...
Leyza Baldo Dorini, Rodrigo Minetto, Neucimar Jer&...
CCS
2006
ACM
13 years 11 months ago
RoleMiner: mining roles using subset enumeration
Role engineering, the task of defining roles and associating permissions to them, is essential to realize the full benefits of the role-based access control paradigm. Essentially,...
Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warne...
INFSOF
2007
68views more  INFSOF 2007»
13 years 7 months ago
Object-based and class-based composition of transitive mixins
In object-oriented composition, classes and class inheritance are applied to realize type relationships and reusable building blocks. Unfortunately, these two goals might be contr...
Uwe Zdun, Mark Strembeck, Gustaf Neumann
SACMAT
2003
ACM
14 years 19 days ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf