Sciweavers

433 search results - page 28 / 87
» Using Description Logics in Relation Based Access Control
Sort
View
IPPS
2003
IEEE
14 years 1 months ago
Heterogeneous Access to Service-Based Distributed Computing: The RMIX Approach
Service-based distributed computing as a mode of resource sharing is receiving increased attention, motivated both by enterprise applications and by standardization efforts in the...
Dawid Kurzyniec, Tomasz Wrzosek, Vaidy S. Sunderam
ICISS
2005
Springer
14 years 1 months ago
Protection of Relationships in XML Documents with the XML-BB Model
Since XML tends to become the main format to exchange data over the Internet, it is necessary to define a security model to control the access to the content of these documents. S...
Frédéric Cuppens, Nora Cuppens-Boula...
SP
2005
IEEE
104views Security Privacy» more  SP 2005»
14 years 1 months ago
On Safety in Discretionary Access Control
An apparently prevailing myth is that safety is undecidable in Discretionary Access Control (DAC); therefore, one needs to invent new DAC schemes in which safety analysis is decid...
Ninghui Li, Mahesh V. Tripunitara
CCS
2008
ACM
13 years 10 months ago
On spatio-temporal constraints and inheritance in role-based access control
Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based acces...
Liang Chen, Jason Crampton
DASFAA
2010
IEEE
176views Database» more  DASFAA 2010»
13 years 8 months ago
Efficient Database-Driven Evaluation of Security Clearance for Federated Access Control of Dynamic XML Documents
Achieving data security over cooperating web services is becoming a reality, but existing XML access control architectures do not consider this federated service computing. In this...
Erwin Leonardi, Sourav S. Bhowmick, Mizuho Iwaihar...