Sciweavers

2847 search results - page 139 / 570
» The Context-Dependent Role Model
Sort
View
SIMULATION
1998
83views more  SIMULATION 1998»
13 years 8 months ago
Libraries of Reusable Models: Theory and Application
Setting up a simulation model is more than writing down state equations and running them on a computer. A lot of conceptual information about the physics and engineering aspects o...
Arno Breunese, Jan L. Top, Jan F. Broenink, J. M. ...
ACSAC
2005
IEEE
14 years 2 months ago
Intrusion Detection in RBAC-administered Databases
A considerable effort has been recently devoted to the development of Database Management Systems (DBMS) which guarantee high assurance security and privacy. An important componen...
Elisa Bertino, Ashish Kamra, Evimaria Terzi, Athen...
IPPS
2006
IEEE
14 years 3 months ago
A brokering framework for large-scale heterogeneous systems
In this paper we discuss the role of a broker in a market-oriented resource allocation model for largescale heterogeneous systems. The simplified model is based upon a three part...
Xin Bai, Ladislau Bölöni, Dan C. Marines...
SACMAT
2004
ACM
14 years 2 months ago
A role-based approach to access control for XML databases
In order to provide a general access control methodology for parts of XML documents, we propose combining rolebased access control as found in the Role Graph Model, with a methodo...
Jingzhu Wang, Sylvia L. Osborn
DEXAW
1998
IEEE
94views Database» more  DEXAW 1998»
14 years 1 months ago
Towards Access Control for Logical Document Structures
This paper presents a first step towards a security model that defines access control for logical document structures. el benefits from roles to abstract from users and from secur...
Fredj Dridi, Gustaf Neumann