Risk based security analysis of permissions in rbac

N Nissanke, EJ Khayat - International Workshop on Security In …, 2004 - scitepress.org
Because of its vulnerability to errors and, hence, unauthorised access, assignment of access
rights is a critically important aspect of RBAC. Despite major advances in addressing this …

Modeling group trust for peer-to-peer access control

A Gummadi, JP Yoon - Proceedings. 15th International …, 2004 - ieeexplore.ieee.org
The information on the Web is growing at a very fast pace. In this ever-accumulating data,
the volume of information being exchanged using peer-to-peer applications is on the rise in …

On the role of roles: from role-based to role-sensitive access control

X Ao, NH Minsky - Proceedings of the ninth ACM symposium on Access …, 2004 - dl.acm.org
This paper maintains that for an access-control (AC) mechanism tosupport a wide range of
policies, it is best to dispense with any built-insemantics for roles in the mechanism itself …

A framework for heterogeneous middleware security

SN Foley, TB Quillinan, M O'Connor… - 18th International …, 2004 - ieeexplore.ieee.org
Summary form only given. With the advent of Web services, achieving seamless
interoperability between heterogeneous middleware technologies has become increasingly …

An attribute-based-delegation-model

C Ye, Y Fu, Z Wu - Proceedings of the 3rd international Conference on …, 2004 - dl.acm.org
Delegation constraint of current delegation models is mostly delegation prerequisite
conditions. In these models, delegation security fully depends on delegator and security …

A greedy algorithm for selecting models in ensembles

AL Turinsky, RL Grossman - Fourth IEEE International …, 2004 - ieeexplore.ieee.org
We are interested in ensembles of models built over k data sets. Common approaches are
either to combine models by vote averaging, or to build a meta-model on the outputs of the …

헬스케어정보시스템의특성을고려한새로운역할기반접근제어모델

이유리, 박동규 - 한국정보기술학회논문지, 2004 - dbpia.co.kr
컴퓨터 산업의 발달로 모든 데이터들이 전자적으로 처리됨에 따라서 헬스 케어 시스템에서의
데이터 또한 전자적으로 처리되게 되었다. 이에 따라서 의료 정보 데이터의 본질적인 접근을 할 …

Delegation of rights using PKI-based components

L Cheung - HKU Theses Online (HKUTO), 2004 - hub.hku.hk
In office operations, it is common for supervisors to delegate specific powers to their
subordinates when they need assistance. Delegation is defined as the grant, or …

[引用][C] 几种基于角色的代理授权模型特征比较

张黎明, 王小明, 李黎 - 微机发展, 2004

[引用][C] 基于角色的代理统一模型

李黎, 王小明, 张黎明 - 计算机工程与应用, 2004