Sciweavers

1147 search results - page 33 / 230
» Transformation of Access Rights
Sort
View
ICC
2000
IEEE
14 years 1 months ago
System Reference Model and Protocol Stack for Broadband Wireless Access
In this contribution, we propose an improved system architecture focusing on system reference and protocol stack for broadband wireless access networks. The proposal aims to constr...
Willie W. Lu, Charles Bry
WETICE
1998
IEEE
14 years 27 days ago
Authorization and Attribute Certificates for Widely Distributed Access Control
We describe a system whose purpose is to explore the use of certificates for the distributed management of access rights for resources that have multiple, independent, and geograp...
William E. Johnston, Srilekha Mudumbai, Mary R. Th...
ESORICS
2006
Springer
14 years 9 days ago
Delegation in Role-Based Access Control
User delegation is a mechanism for assigning access rights available to a user to another user. A delegation operation can either be a grant or transfer operation. Delegation for r...
Jason Crampton, Hemanth Khambhammettu
ACSW
2006
13 years 10 months ago
A method for access authorisation through delegation networks
Owners of systems and resources usually want to control who can access them. This must be based on having a process for authorising certain parties, combined with mechanisms for e...
Audun Jøsang, Dieter Gollmann, Richard Au
WETICE
1996
IEEE
14 years 24 days ago
Role-based security for distributed object systems
This paper describes a security architecture designed to support role-based access control for distributed object systems in a large-scale, multi-organisational enterprise in whic...
Nicholas Yialelis, Emil Lupu, Morris Sloman