… As the wide uses of access control model in systems, a more agile access control model is required to solve complicated modeling, user authorizing and verifying problem. In this paper, an access control model based on the concepts of role …
Young Computer Scientists, 2008. ICYCS 2008. The 9th International Conference for, , Oct 2008. [doi]… As the wide uses of access control model in systems, a more agile access control model is required to solve complicated modeling, user authorizing and verifying problem. In this paper, an access control model based on the concepts of role …
Young Computer Scientists, 2008. ICYCS 2008. The 9th International Conference for, , Oct 2008. [doi]… While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived …. This paper argues that reliance on DAC as the principal method of access control …
eprint arXiv, 0903, Mar 2009.… While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived …. This paper argues that reliance on DAC as the principal method of access control …
eprint arXiv, 0903, Mar 2009.… While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived …. This paper argues that reliance on DAC as the principal method of access control …
arXiv, cs.CR, Mar 2009.… While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived …. This paper argues that reliance on DAC as the principal method of access control …
arXiv, cs.CR, Mar 2009.… Traditionally, access control is understood as a purely technical mechanism which rejects or accepts access attempts automatically according to a specific preconfiguration. However, such a perspective neglects the practices of access …
Transactions on Computer-Human Interaction (TOCHI, 16(3), Sep 2009.… Traditionally, access control is understood as a purely technical mechanism which rejects or accepts access attempts automatically according to a specific preconfiguration. However, such a perspective neglects the practices of access …
Transactions on Computer-Human Interaction (TOCHI, 16(3), Sep 2009.… Although RBAC models have received broad support as a generalized approach to access control, the administration of roles in large organizations can become quite cumbersome. In this paper, we develop a new paradigm for access control …
Networked Computing and Advanced Information Management, 2008. NCM '08. Fourth International Conference on, 1, Aug 2008. [doi]… Although RBAC models have received broad support as a generalized approach to access control, the administration of roles in large organizations can become quite cumbersome. In this paper, we develop a new paradigm for access control …
Networked Computing and Advanced Information Management, 2008. NCM '08. Fourth International Conference on, 1, Aug 2008. [doi]… Aimed at security issues in collaborative process planning system, a multi-level and dynamic access control (PPMLDAC) model was proposed for collaborative process planning based on Role Based Access Control (RBAC) model. A multi-level …
Intelligent Information Technology Application, 2008. IITA '08. Second International Symposium on, 1, Nov 2008. [doi]… Aimed at security issues in collaborative process planning system, a multi-level and dynamic access control (PPMLDAC) model was proposed for collaborative process planning based on Role Based Access Control (RBAC) model. A multi-level …
Intelligent Information Technology Application, 2008. IITA '08. Second International Symposium on, 1, Nov 2008. [doi]… A review of the state of the art of role-based access control can help practitioners assess RBAC’s applicability to their organization and indicates where more research is needed to improve the RBAC model. …
computer, 45:81-88, 2012. [doi]… Role Based Access Control (RBAC) is arguably the most common access control mechanism today due to its applicability at various levels of authorization in a system. Time varying nature of access control in RBAC administered systems …
Information Assurance and Security, 2008. ISIAS '08. Fourth International Conference on, , Aug 2008. [doi]… Role Based Access Control (RBAC) is arguably the most common access control mechanism today due to its applicability at various levels of authorization in a system. Time varying nature of access control in RBAC administered systems …
Information Assurance and Security, 2008. ISIAS '08. Fourth International Conference on, , Aug 2008. [doi]… of access control. The extension supports the definition of a wide range of access control policies concisely and transparently as a separate concern. In addition to regulating the access to pages and actions, access control rules …
ICWE 2008: 175-188 [doi]… Emerging models for context-aware role-based access control pose challenging requirements over policy administration. In this paper we address the issues raised by the decentralized administration of a spatially-aware access control model …
Availability, Reliability and Security, 2008. ARES 08. Third International Conference on, , Feb 2008. [doi]… Emerging models for context-aware role-based access control pose challenging requirements over policy administration. In this paper we address the issues raised by the decentralized administration of a spatially-aware access control model …
Availability, Reliability and Security, 2008. ARES 08. Third International Conference on, , Feb 2008. [doi]… Role-based access control (RBAC) is a powerful means for laying out higher-level organizational policies such as separation of duty, and for simplifying the security management process. One of the important aspects of RBAC is authorization …
Computer Security Applications Conference, 2008. ACSAC 2008. Annual, , Nov 2008. [doi]… Role-based access control (RBAC) is a powerful means for laying out higher-level organizational policies such as separation of duty, and for simplifying the security management process. One of the important aspects of RBAC is authorization …
Computer Security Applications Conference, 2008. ACSAC 2008. Annual, , Nov 2008. [doi]